In the event of a security incident, many outside entities may be considered in order to properly respond and handle to the incident in the most effective manner for both the customers and the organization/business. Some of the outside parties discussed in the reading included law enforcement, other incident response teams, software/support vendors, internet service providers, incident reporteres, and customers, constituents, and media. It is important for the organization to develop a good connection and communication with these outside parties before and in response to an event. While deciding how and what to communicate with the outside parties, there are several factors that the organization who had the security breach much take into consideration before taking action. The first consideration discussed is an organization’s ISP. This can be important “in blocking a major network-based attack or tracing its origin” (p. 12). Owners of the attacking addresses is also relevant because secure contacts should be able to collect evidence this way with coordination. Another factor is the software vendors themselves. This could be useful as sometimes the breach occurs through the software in a way that was an unknown vulnerability to the software vendor and organization. Other incident response teams may be a resource utilized the organization’s own response team as it could be a similar threat or issue already handled by their team, wherein they can share information on how they dealt effectively with the issue. The last consideration discussed in the reading is about directly contacting affected parties, possibly even making accusations that one of their users is performing an attack or breach on the organization. All of these considerations are important when communicating and establishing a response team to a security breach.
Work Cited Cichonski, P., Millar , T., Glance, T., & Scarfone, K. (2012, August). Computer Security Incident Handling Guide – nvlpubs.nist.gov. Retrieved October 7, 2019, from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf.
Leave a Reply