02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• hacker attacks: $2,100<br />

• copyright violations: $340<br />

The authors point out in <strong>the</strong> second study that <strong>the</strong> focus was on specific types <strong>of</strong> incidents<br />

that participating schools believed were on <strong>the</strong> rise. They also stated that <strong>the</strong>y used <strong>the</strong> “most<br />

conservative figures for calculating costs in all cases” [Rezmierski 00].<br />

Ano<strong>the</strong>r result <strong>of</strong> <strong>the</strong> ICAMP studies confirms an observation that <strong>the</strong> CERT CSIRT Development<br />

Team has made: <strong>the</strong>re is a lack <strong>of</strong> robust database tools to collect, track, and assess<br />

<strong>the</strong> amount <strong>of</strong> time spent handling and resolving incidents. The ICAMP studies also pointed<br />

out that in <strong>the</strong> university environment <strong>the</strong>re is insufficient staffing to be able to identify <strong>the</strong><br />

types <strong>of</strong> incidents that are occurring.<br />

In 1998, David Dittrich used <strong>the</strong> ICAMP I incident cost model to calculate <strong>the</strong> costs associated<br />

with a large-scale incident affecting multiple hosts at <strong>the</strong> University <strong>of</strong> Washington. In a<br />

<strong>Security</strong>Focus article, Dittrich says “fair and accurate damage estimates can be produced, and<br />

with very little work, provided that those doing <strong>the</strong> work are disciplined and diligent in keeping<br />

track <strong>of</strong> time, at <strong>the</strong> time <strong>of</strong> incident response. Unfortunately, this is where <strong>the</strong> system<br />

<strong>of</strong>ten breaks down…The need for diligence in collecting time data for every security incident<br />

response calls for policies and procedures to be set at <strong>the</strong> institutional level, and enforced as a<br />

regular part <strong>of</strong> incident handling, in order to have meaningful figures on institutional losses<br />

due to security incidents” [Dittrich 02].<br />

He went on to provide information about tracking and calculating <strong>the</strong>se costs:<br />

The fact is, it is ra<strong>the</strong>r simple to estimate damage due to security incidents if you<br />

know a few simple facts about <strong>the</strong> personnel who are responding to, or are affected<br />

by, <strong>the</strong> incident. Such information can be ascertained by answering <strong>the</strong><br />

following questions:<br />

• Who worked on responding to or investigating <strong>the</strong> incident?<br />

• How many hours did each <strong>of</strong> <strong>the</strong>m spend?<br />

• How many people were prevented from working because <strong>of</strong> <strong>the</strong> incident?<br />

• How much productive time did each <strong>of</strong> <strong>the</strong>m lose?<br />

• How much do you pay each <strong>of</strong> those people to work for you?<br />

• How much overhead do you pay (insurance, sick leave, etc.) for your employees?<br />

Once you know <strong>the</strong>se facts (and <strong>the</strong>y are all pretty easy to determine), it takes<br />

simple ma<strong>the</strong>matics to come up with a pretty accurate damage estimate [Dittrich<br />

98].<br />

CMU/SEI-2003-TR-001 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!