The information security incident management
policies are very significance as far as the computers networks or IT security
is concern. Learning the incident response procedure in the organization is
normally happen formally in management and meetings presentations and through
the reports reviewing and sharing. The security framework inspires association
to administer the tension to explore new ideas and what is learnt by people
from the previous incidents.
Keywords: information security, incident management policies, Information
Security Incident
Introduction of Information Security Incident
Management and Policies
The
management policy
of security incident is the procedure
of managing, identifying, analyzing
and recording security incidents
or threats immediately. It requires giving a comprehensive and robust vision of
any issues related to security in
an IT infrastructure. In the information technology and computer security fields,
incident management for computer security involves the detection and monitoring
of security incidents on a computer network or computer, and the proper
responses execution to those incidents. In this research there would be discussing about the information
security incident management and policies and how it help the organization to avoid
any sort of security violation [1].
Incident Response Practice of Information Security Incident Management
and Policies
The incident in organization is a violation (or
approaching violation risk) of PC security strategies, reliable policies of
use, or standard security measures. In this way, service denial, unapproved
sharing of delicate data, a malevolent assault on a processing framework or
network and the coincidental denial of an imperative report all qualify as
incidents [2]. The literature generally
have the same opinion that while tackling an incident, IRTs normally connect in
6 stages sequential that are known as preparation, identification, containment,
eradication, recovery and follow-up . The follow up purpose is to imitate on
the incident controlling experience and recognize ‘learned lessons’ that can be
included into procedures of standard operations [2].
How Lessons Are Learned of Information
Security Incident Management and Policies
The Incident Response Process
The response of the professional incident
literature places huge significance on learning post-incident. On the other
hand, the focal point tends to be on improving counteractive actions to improving
efficiency and lowering cost [3]. Learning the Incident
Response Process in the organization is typically happen officially in management
and meetings presentations and via the reviewing and sharing of reports. Recognized
a lot of challenges that related to practices of learning that includes: a willingness
lack to share information related to incident- outside the association (e.g.
with industry); poor collaboration and communication between the teams and IRT from
other areas of organizational lack of motivation for activities of learning;
and insufficient lessons sharing learnt inside
the organizations [3].
The incident management process of Information
Security Incident Management and Policies
An event
of information security can be definite as recognized system occurrence, network
or service state representative a possible information security breach, failure
or policy of controls, or a beforehand unfamiliar state of affairs that might
be security appropriate. An incident related to information security is a “series
or single of unexpected or unwanted events of information security that have an
important compromising probability for business operations and intimidating
information security”. The incident management Information security and NIST
Special Publication for Incident Handling in Computer Security show up as two
of the major guidelines and standards concerning incident in the information
security management [4].
Both of
them offers a prepared approach for management of incident, including preparing
and planning for response on incident [5]. There is question
that what to do when incidents occur, and how to take out learnt lessons afterwards.
The SANS guide is quite diminutive and have only an overview of activities depends
on every phase [6]. ENISA has disqualified
the phase of preparations and only paying attention on the response activities
by a team when any incident of violation occurs in the organization [3].
Organizational Learning of Information
Security Incident Management and Policies
The learning in the organizational, as a field
of research, inspects how organizations build up information and 'routines' to direct
their behaviors. Organizations learning take place at the team, organizational and
individual level. Understanding the interaction and interplay among these levels
of learning is a main theme in learning of organizational. To meet objectives
of the research there are three needs for the framework learning [4]. The framework have
to take on a multi-level approach openly linking event responder to
stakeholders ( for example senior management security and management team); not
be completely cognitive, but connection of the cognition to achievement so unusual
patterns in individual recognition security leads to transform in process of security,
and employ double-loop principles of learning [4].
Only the 4I (interpreting and
experimenting, institutionalizing, intuiting and attending, integrating) organizational
framework of learning met all 3 requirements. The 4I structure explicitly aim
learning at team, organizational and individual levels at the same time as incorporate
double loop principles of learning. This framework encourages association to supervise
the tension among explore new ideas and exploiting what is learnt by the people.
This ‘strategic renewal’ norm of challenge institutional - a mainly useful typical
as it is expected that learned lessons from incidents security will challenge culture
compliance - a key obstruction to the effective security strategy development [2]
Conclusion of Information Security Incident
Management and Policies
Summing up the discussion it can be said that
the In the information technology and computer
security fields, incident management for computer security involves the
detection and monitoring of security incidents on a computer network The
literature generally have the same opinion that while tackling an incident. Learning
the Incident Response Process in the organization is typically happen
officially in management and meetings presentations and via the reviewing and
sharing of reports. Understanding the interaction and interplay among these
levels of learning is a main theme in learning of organizational [3].
The 4I structure explicitly aim learning at
team, organizational and individual levels at the same time as incorporate
double loop principles of learning. An incident related to information security
is a “series or single of unexpected or unwanted events of information security
that have a important compromising probability for business operations and
intimidating information security. The follow up purpose is to imitate on the incident controlling
experience and recognize ‘learned lessons’ that can be included into procedures
of standard operations. So it may be said that the computer security management
can be improved by employing the policies that are discussed in this research
paper.
References of Information
Security Incident Management and Policies
[1]
|
A. Ahmad and S.
B. Maynard, "A Case Analysis of Information Systems and Security
Incident Responses," International Journal of Information Management
· , 2015.
|
[2]
|
I. Luke,
"What is a cyber security incident?," 23 November 2018. [Online].
Available: https://www.itgovernance.co.uk/blog/what-is-a-cyber-security-incident.
|
[3]
|
A. Atif, H.
Justin and R. A.B, "Incident Response Teams – Challenges in Supporting
the Organisational Security Function," University of Melbourne,
Australia, 2011.
|
[4]
|
M. Bartnes and
M. G. Jaatun, "Information security incident management: Current
practice as reported in the literature," Computers & Security , pp.
42 -5 7, 2014.
|
[5]
|
H. Susanto, M.
N. Almunawar and Y. C. Tuan, "Information Security Management System
Standards: A Comparative Study of the Big Five," International
Journal of Electrical & Computer Sciences, vol. 11, no. 5, pp. 23-
29, 2011.
|
[6]
|
N. Lord,
"What is Security Incident Management? The Cybersecurity Incident
Management Process, Examples, Best Practices, and More," 12 September
2018. [Online]. Available:
https://digitalguardian.com/blog/what-security-incident-management-cybersecurity-incident-management-process.
|
[7]
|
I. A. Tøndel, M.
Bartnes and M. G. Jaatun, "Information security incident management: Current
practice as reported in the literature," Computers & Security, vol.
45, pp. 42-57, 2014.
|