Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Source and Intent

Handbook of Research on Individualism and Identity in the Globalized Digital Age
Identifying the source and intent of an information security incident may provide valuable information for the management of the information security incident. The source and intent of an information security incident is any combination of internal or external actors with purposeful or accidental intentions be they malicious or benign ( Halfond, Choudhary, & Orso, 2011 ; Hua & Bapna, 2013 ). These two factors impact incident response in unique ways as each potential attacker and intention changes the course of investigations.
Published in Chapter:
Turning Weakness into Strength: How to Learn From an IT Security Incident
Randy L. Burkhead (Capella University, USA)
DOI: 10.4018/978-1-5225-0522-8.ch006
Abstract
In today's culture organizations have come to expect that information security incidents and breaches are no longer a matter of if but when. This shifting paradigm has brought increased attention, not to the defenses in place to prevent an incident but, to how companies manage the aftermath. Using a phenomenological model, organizations can reconstruct events focused on the human aspects of security with forensic technology providing supporting information. This can be achieved by conducting an after action review for incidents using a phenomenological model. Through this approach the researcher can discover the common incident management cycle attributes and how these attributes have been applied in the organization. An interview guide and six steps are presented to accomplish this type of review. By understanding what happened, how it happened, and why it happened during incident response, organizations can turn their moment of weakness into a pillar of strength.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR