Incident Preparedness and Response: Devlopming a Security Policy

Incident Preparedness and Response: Devlopming a Security Policy

Warren Wylupski (University of New Mexico, USA), David R. Champion (Slippery Rock University, USA) and Zachary Grant (New Mexico Mounted Patrol, USA)
Copyright: © 2006 |Pages: 26
DOI: 10.4018/978-1-59140-872-7.ch010
OnDemand PDF Download:


One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network security. Security attacks and breaches of an organization’s computer network can result in the compromise of confidential data, loss of customer confidence, poor public relations, disruption of business, and severe financial loss. Furthermore, loss of organizational data can present a number of criminal threats, including extortion, blackmail, identity theft, technology theft, and even hazards to national security. This chapter first examines the preparedness and response of three southwestern companies to their own specific threats to corporate cyber-security. Secondly, this chapter suggests that by developing an effective security policy focusing on incident detection and response, a company can minimize the damage caused by these attacks, while simultaneously strengthening the existing system and forensic processes against future attacks. Advances in digital forensics and its supporting technology, including intrusion detection, intrusion prevention, and application control, will be imperative to maintain network security in the future.

Complete Chapter List

Search this Book:
Table of Contents
Kyriakos Tsiflakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Chapter 1
Thomas M. Chen, Chris Davis
This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A... Sample PDF
An Overview of Electronic Attacks
Chapter 2
Steven Furnell, Jeremy Ward
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This... Sample PDF
Malware: An Evolving Threat
Chapter 3
Sriranjani Sitaraman, Subbarayan Venkatesan
This chapter introduces computer and network forensics. The world of forensics is well understood in the non-digital world, whereas this is a... Sample PDF
Computer and Network Forensics
Chapter 4
III Richard, Vassil Roussev
Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and... Sample PDF
Digital Forensic Tools: The Next Generation
Chapter 5
Philip Craiger, Jeff Swauger, Chris Marberry, Connie Hendricks
An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations... Sample PDF
Validation of Digital Forensic Tools
Chapter 6
Dario Valentino Forete
Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct... Sample PDF
Log Correlation: Tools and Techniques
Chapter 7
Pallavi Kahai, Kamesh Namuduri, Ravi Pense
Security incidents that threaten the normal functioning of the organization are on the rise. In order to resist network attacks most organizations... Sample PDF
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Chapter 8
Caroline Chibelushi, Bernadette Sharp, Hanifa Shah
The advancement of multimedia and communication systems has not only provided faster and better communication facilities but also facilitated easier... Sample PDF
ASKARI: A Crime Text Mining Approach
Chapter 9
Sos S. Agaian, Benjamin M. Rodriguez
This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample... Sample PDF
Baseic Steganalysis for the Digital Media Forensics Examiner
Chapter 10
Warren Wylupski, David R. Champion, Zachary Grant
One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network... Sample PDF
Incident Preparedness and Response: Devlopming a Security Policy
Chapter 11
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
The purpose of this chapter is twofold: Firstly, we want to determine the relationships, if any, between the discipline of digital forensics and the... Sample PDF
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
Chapter 12
Andreas Mitrakas, Damián Zaitch
The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal... Sample PDF
Law, CyberCrime and Digital Forensics: Trailing Digital Suspects
Chapter 13
Bernd Carsten Stahl, Moira Carroll-Mayer, Peter Norris
In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals.... Sample PDF
Forensic Computing: The Problem of Developing a Multidisciplinary University Course
Chapter 14
Christopher Malinowski
This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and... Sample PDF
Training the Cyber Investigator
Chapter 15
Michael A. Caloyannides
Digital data increasingly presented in courts as evidence is mistakenly viewed by judges and juries as inherently unalterable. In fact, digital data... Sample PDF
Digital "Evidence" is Often Evidence of Nothing
About the Authors