02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• insider abuse <strong>of</strong> internal computer resources [Australia 02]<br />

The Australian <strong>Computer</strong> Crime & <strong>Security</strong> Survey for 2003 asked for feedback on <strong>the</strong>se<br />

same categories <strong>of</strong> attacks. The 2003 survey was submitted to 350 public companies in Australia,<br />

with responses from 214. The survey results for <strong>the</strong> annual cost <strong>of</strong> computer crime for<br />

2003 totaled more than $11.8 million, 65 double <strong>the</strong> $5.7 million reported in <strong>the</strong> previous<br />

year’s survey [Australia 03]. The 2002 survey pointed out that some <strong>of</strong> <strong>the</strong> respondents’ costs<br />

reflected only <strong>the</strong> cost <strong>of</strong> investigation and recovery. O<strong>the</strong>r losses, such as lost business opportunities,<br />

degradation <strong>of</strong> network performance, and cost <strong>of</strong> misuse, to mention a few, were<br />

difficult to quantify.<br />

Simone Kaplan, in a CSO Online article “Criteria for Determining <strong>the</strong> Cost <strong>of</strong> a Breach,”<br />

provides a list that can be used to identify costs associated with a computer security incident<br />

[Kaplan 02]:<br />

• system downtime<br />

• people downtime<br />

• hardware and s<strong>of</strong>tware costs<br />

• consulting fees<br />

• money (salaries/benefits)<br />

• cost <strong>of</strong> information<br />

• cost <strong>of</strong> lost business<br />

• incidentals<br />

• legal costs<br />

• cost to company reputation<br />

The Center for Education and Research in Information Assurance and <strong>Security</strong> (CERIAS)<br />

<strong>Incident</strong> <strong>Response</strong> Database is an example <strong>of</strong> an incident tracking system designed to help<br />

capture <strong>the</strong> costs <strong>of</strong> incidents. It is a web-based system that can be downloaded for free from<br />

https://cirdb.cerias.purdue.edu/website/ [CERIAS 03].<br />

3.3.5 Making a Case to Management<br />

Whatever <strong>the</strong> form <strong>of</strong> <strong>the</strong> CSIRT capability, much <strong>of</strong> <strong>the</strong> literature (see, for example, Mandia,<br />

West-Brown, and SANS) makes <strong>the</strong> point that, to be successful, <strong>the</strong> team must have senior<br />

65<br />

Note that <strong>the</strong> total responding for 2002 was 75 (80%), whereas for 2003 it was 126 (58%).<br />

62 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!