Page 31 - Cyber Warnings
P. 31
The challenges of the good incident response strategies
By Milica D. Djekic
The incident response (IR) is one of the key challenges to a modern cyber defense. Practically,
it would include three crucially important steps being (1) preparation, (2) response and (3)
remediation. Some of these details got found using the web resources, but we would not rely on
the findings being provided in the literature only. We intend to put more effort and present some
of our original contributions suggesting the importance of the good IR’s strategy. The purpose of
this article would be to provide a helpful review of the possible IR’s strategies as well as
recommend how to deal with their challenges.
Many people would talk about the IR, but what is that for real? Imagine you are at some
cyberspace spot and something harmful got occurred there. First thing you should think about
would be how to resolve such a situation. It’s well-recommended to get familiar with some of the
scenarios from a practice, because that would offer you an opportunity to deal with that incident
in a more effective way. So, the keyword here would be the good preparation. In other words,
you need to have the people, technology and processes being ready to react when some
malicious occurrence takes place within your IT asset.
You should know that some of those incidents require mobilizing the majority of your resources
that would contribute in resolving of the certain cyber situation. It’s quite clear that it’s not that
smart and effective relying on the improvisation when the incident happens, because that could
take a lot of time and cost your employer greatly. So, just get prepared to react on the certain IT
security situation and you would make your effort being less time-consuming and more cost-
effective.
For instance, it’s well encouraging to get
prepared some procedures and steps that could
get followed in responding to cyber incident
making your business suffer from the less
discontinuity.
The next step in the good IR strategy would be
the responding itself. It’s well-known that the
responding would seek the very skillful staffs on
a spot being capable to handle quite trickery
situations.
Those skills and expertise come with the
experience as well as with the good education,
training and expert’s events.
31 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide