2019
DOI: 10.1007/978-3-030-11890-7_59
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Security for Incident Management Process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…The incident response process is well defined among many methodologies [55] [56]; a summary can be found in [57]. Many works define the particular subtactics, after the incident identification, such as containment, eradication, recovery and lessons learned [58], with little variation from this approach [59]. In any case, as we have stated before, SOC particular response activities depend on multiple factors, so these sub-tactics do not always apply; for example, a particular agreement with a customer may define the response to a specific incident type just as the notification of the action, or by automatic network block without further investigation or activities.…”
Section: Our Proposalmentioning
confidence: 99%
“…The incident response process is well defined among many methodologies [55] [56]; a summary can be found in [57]. Many works define the particular subtactics, after the incident identification, such as containment, eradication, recovery and lessons learned [58], with little variation from this approach [59]. In any case, as we have stated before, SOC particular response activities depend on multiple factors, so these sub-tactics do not always apply; for example, a particular agreement with a customer may define the response to a specific incident type just as the notification of the action, or by automatic network block without further investigation or activities.…”
Section: Our Proposalmentioning
confidence: 99%
“…Andrade and Yoo, as well, investigate which part of the work can be automated to support security analysts [5]. Furthermore, Andrade et al conducted a literature review to pinpoint ways software tools and process can improve analysts' work [4]. Mullins et al designed a prototype dashboard and evaluated its usefulness to facilitate situational awareness in a team of security analysts [32].…”
Section: The Human Factor In Threat Identification and Incidence Resp...mentioning
confidence: 99%
“…Due to infrastructural limitations, we collect reports using an online survey. 3 Each group could report up to five 4 suspicious activities detected during the experiment. Table 4 provides an overview of the questions.…”
Section: Experiments Preparationmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, NIST, in its special publication SP 800-61, defines five phases: (i) preparation, (ii) detection and analysis, (iii) containment, (iv) eradication and recovery, and (v) post-incident [43], [44]. In particular, the post-incident phase constitutes the final phase once an incident has been resolved.…”
Section: Introductionmentioning
confidence: 99%