02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Level/Priority<br />

Low<br />

Type <strong>of</strong> <strong>Incident</strong>/Activity<br />

Network switch, news, chat, or shell server<br />

[Schultz 02]<br />

Level 1<br />

Level 2<br />

Level 3<br />

Level 4<br />

Low impact (affects one location; e.g., virus incident)<br />

Local event with major impact on operations (compromise <strong>of</strong> a privileged<br />

account, <strong>the</strong>ft <strong>of</strong> critical equipment)<br />

Minor impact event affecting two or more locations (e.g., non-destructive<br />

virus; email spamming)<br />

High-impact event affecting many sites (intrusion on critical global application)<br />

Internet <strong>Security</strong> Systems. “<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> Planning, Preparing for <strong>the</strong> Inevitable.”<br />

Atlanta, GA, 2001.<br />

Severity 1<br />

Severity 2<br />

Severity 3<br />

Severity 4<br />

Severity 5<br />

Low-level probes/scans on internal systems; known virus (easily handled by<br />

AV s<strong>of</strong>tware)<br />

Probes/scans on external systems; potential threats identified<br />

Significant probes/scans; penetration <strong>of</strong> denial <strong>of</strong> service (DoS) attacks attempted<br />

without impact on operations; widespread known virus attacks<br />

(easily handled by AV s<strong>of</strong>tware); isolated instances <strong>of</strong> new viruses<br />

Penetration or DoS attacks with limited impact on operations; widespread<br />

new computer virus attacks (not handled by AV s<strong>of</strong>tware); risk <strong>of</strong> negative<br />

financial/public relations impact<br />

Successful penetration or DoS attacks with significant impact on operations;<br />

signification risk <strong>of</strong> negative financial/public relations impact<br />

[Schultz 90]<br />

Priority 1<br />

Priority 2<br />

Priority 3<br />

Priority 4<br />

Priority 5<br />

[Schiffman 01]<br />

Low<br />

Moderate<br />

Hard<br />

Human life, human safety<br />

Protect classified/sensitive data<br />

Protect o<strong>the</strong>r data (proprietary, scientific, managerial, etc.)<br />

Prevent damage to systems (loss/alteration <strong>of</strong> files, damage to disk drives)<br />

Minimize disruption <strong>of</strong> computing resources<br />

Ra<strong>the</strong>r than priorities, this methodology rates in terms <strong>of</strong> attack complexity<br />

and technical ability <strong>of</strong> attacker(s)<br />

“script kiddie” attacks, well understood, no innovation<br />

Attack uses publicly known/available attack method, additional modification<br />

(e.g., forgery, different attack behaviors)<br />

Clever and reasonably skilled attacker; exploit may/may not be publicly<br />

known; attacker writes own code<br />

96 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!