02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

3.7.1 Defining <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong>s and O<strong>the</strong>r <strong>Incident</strong><br />

<strong>Response</strong> Terminology<br />

One <strong>of</strong> <strong>the</strong> problems facing <strong>the</strong> CSIRT community today is <strong>the</strong> lack <strong>of</strong> a standard taxonomy<br />

or a standard set <strong>of</strong> definitions for describing incident response activities and events. This has<br />

caused much confusion when trying to exchange data between teams or with sites. In particular,<br />

<strong>the</strong> actual definition <strong>of</strong> <strong>the</strong> term “incident” varies from team to team. For example, definitions<br />

for “incident” in <strong>the</strong> literature reviewed included <strong>the</strong> following:<br />

• The CSIRT FAQ defines an incident as “any real or suspected adverse event in relation to<br />

<strong>the</strong> security <strong>of</strong> computer systems or computer networks.” Ano<strong>the</strong>r definition is “<strong>the</strong> act <strong>of</strong><br />

violating an explicit or implied security policy” [CSIRT 02].<br />

• Allen, in The CERT Guide to System and Network <strong>Security</strong> <strong>Practice</strong>s, describes an incident<br />

as “a collection <strong>of</strong> data representing one or more related attacks. In addition, a set <strong>of</strong><br />

steps are described that are comprised <strong>of</strong> a series <strong>of</strong> practices used to respond to incidents,<br />

e.g., analyze, communicate, collect, and protect. These are followed with practices<br />

to contain, eliminate, return systems to operations, and improve <strong>the</strong> process” [Allen 99].<br />

• A draft version <strong>of</strong> The <strong>State</strong> <strong>of</strong> Vermont’s incident reporting procedures for <strong>the</strong>ir CSIRT<br />

defines an incident as “any irregular or adverse event, which can be electronic, physical,<br />

or social that occurs on any part <strong>of</strong> <strong>the</strong> <strong>State</strong>’s infrastructure” [Vermont 01].<br />

• In a joint survey from AusCERT, Deloitte Touche Tohmatsu, and <strong>the</strong> New South Wales<br />

Police in May 2002, a computer security incident is defined as “an attack against a computer<br />

or network, ei<strong>the</strong>r real or perceived” and “any type <strong>of</strong> computer network attack,<br />

computer-related crime, and <strong>the</strong> misuse or abuse <strong>of</strong> network resources or access” [Aus-<br />

CERT 02].<br />

• The SANS <strong>Incident</strong> Handling Step-by-Step guide defines an incident as “an adverse event<br />

in an information system and/or network, or <strong>the</strong> threat <strong>of</strong> <strong>the</strong> occurrence <strong>of</strong> such an<br />

event” [SANS 03].<br />

• The Department <strong>of</strong> <strong>the</strong> Navy incident response guidebook uses <strong>the</strong> same definition as<br />

SANS [Navy 96].<br />

• Van Wyk and Forno describe an incident (in its most basic terms) as “a situation in which<br />

an entity’s information is at risk,” without explicitly saying whe<strong>the</strong>r it is an event or an<br />

attack [van Wyk 01].<br />

• Mandia defines incidents as “events that interrupt normal operating procedure and precipitate<br />

some level <strong>of</strong> crisis” [Mandia 01].<br />

• Howard describes an incident as “a group <strong>of</strong> attacks that can be distinguished from o<strong>the</strong>r<br />

incidents because <strong>of</strong> <strong>the</strong> distinctiveness <strong>of</strong> <strong>the</strong> attackers and <strong>the</strong> degree <strong>of</strong> similarity <strong>of</strong><br />

sites, techniques, and timing.” He also defines computer security as “preventing attackers<br />

from achieving objectives through unauthorized access or unauthorized use <strong>of</strong> computers<br />

and networks” [Howard 97].<br />

82 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!