Skip to main content

A Readiness Model for Measuring the Maturity of Cyber Security Incident Management

  • Conference paper
  • First Online:
  • 1189 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 23))

Abstract

Hardly a week goes by without headlines about new cyber-attacks. As the sophistication of cyber-attacks constantly increases, organizations have to consider to be affected by attacks. In order to effectively and efficiently react to an incident, professional and well-organized incident management has to be in place. The major goal of this paper is to support organizations to develop and improve their cyber-security incident management. Therefore, in this work, a readiness model, covering nearly 80 topics and 500 requirements in the domain of incident management, is introduced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. CERT.at “CERT.at Statistiken”. https://www.cert.at/services/statistics/statistics.html. Accessed 20 June 2018

  2. Trevor White, D.L., Anderson, M., Team, S.: Global economic crime survey 2016 - adjusting the lens on economic crime preparation brings opportunity back into focus. pricewaterhousecoopers, Technical report (2016). http://www.pwc.com/gx/en/economic-crime-survey/pdf/GlobalEconomicCrimeSurvey2016.pdf

  3. Wood, P., et al.: Internet security threat report. Symantec, Technical report, April 2016

    Google Scholar 

  4. Center for Strategic and International Studies, “Net losses: Estimating the global cost of cybercrime,” June 2014. https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/McAfee%20and%20CSIS%20-%20Econ%20Cybercrime.pdf. Accessed 18 June 2018

  5. Deloitte, Cyber crisis management: Readiness, response and recovery (2016). https://www2.deloitte.com/content/dam/Deloitte/global/Documents/Risk/gx-cm-cyber-pov.pdf. Accessed 20 June 2018

  6. Bromiley, M., Lee, R.: Incident response capabilities in 2016: the 2016 sans incident response survey. SANS Institute InfoSec Reading Room, June 2016. https://www.sans.org/reading-room/whitepapers/incident/incident-responsecapabilities-2016-2016-incident-response-survey-37047. 20 June 2018

  7. ISO/IEC 27035 - Information technology - Security techniques - Information security incident management, ISO/IEC Std.

    Google Scholar 

  8. ISO/IEC 27002:2014 - Information technology - Security techniques - Code of practice for information security controls (ISO/IEC 27002:2013 + Cor 1:2014), ISO/IEC Std. 27002:2014, Rev. cor. 1:2014 (2014)

    Google Scholar 

  9. Computer Security Incident Handling Guide, NIST Std. 800-61, Rev. 2, August 2012. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf. Accessed 20 June 2018

  10. Kral, P.: Incident handler’s handbook. SANS Institute InfoSec Reading Room, December 2011. https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901. 20 June 2018

  11. Proffitt, T.: Creating and managing an incident response team for a large company. SANS Institiute InfoSec Reading Room (2007). https://www.sans.org/reading-room/whitepapers/incident/creating-managing-incidentresponse-team-large-company-1821. 20 June 2018

  12. IT-Grundschutz B 1.8 Behandlung von Sicherheitsvorfällen, Bundesamt für Sicherheit in der Informationstechnik Std., Rev. 11. EL Stand (2009). https://www.bsi.bund.de/DE/Themen/ITGrundschutz/ITGrundschutzKataloge/Inhalt/_content/baust/b01/b01008.html

  13. Creasey, J.: Cyber security incident response guide. CREST (2013). https://www.crest-approved.org/wp-content/uploads/2014/11/CSIR-Procurement-Guide.pdf. Accessed 20 June 2018

  14. ENISA, “Good practice guide for incident management,” December 2010. https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management. Accessed 20 June 2018

  15. West-Brown, M.J., et al.: Handbook for computer security incident response teams (csirts), April 2003. http://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf. Accessed 20 June 2018

  16. Bazin, A.A.: Boyds OODA Loop and the Infantry Company. Infantery Magazin, January-February 2005. https://www.academia.edu/attachments/34552740/download_file?st=MTQxNzczOTU2MSwxMDguMjYuMTIzLjE2MQ%3D%3D&s=popover. Accessed 18 June 2018

  17. Council of European Union: Regulation (eu) 2016/679 of the european parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection regulation), April 2016. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG. Accessed 20 June 2018

  18. Councile of European Union: Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, July 2016. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2016.194.01.0001.01.ENG. Accessed 20 June 2018

Download references

Acknowledgements

The financial support by the Austrian Federal Ministry for Digital and Economic Affairs and the National Foundation for Research, Technology and Development is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David Rieger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rieger, D., Tjoa, S. (2019). A Readiness Model for Measuring the Maturity of Cyber Security Incident Management. In: Xhafa, F., Barolli, L., Greguš, M. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 23. Springer, Cham. https://doi.org/10.1007/978-3-319-98557-2_26

Download citation

Publish with us

Policies and ethics