Healthcare Information Security and Privacy by Sean P. Murphy
Author:Sean P. Murphy
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2015-07-15T16:00:00+00:00
Containment, Eradication, and Recovery Phase
There is probably no other responsibility of the incident response team that is more important than evidence collection and preservation, which happens primarily in containment. Of course, information that is collected in the detection phase could serve as evidence too. The responsibilities of the incident response team may now progress into formal digital forensics. As such, the team also serves as the organizational focal point for security incidents as resources are provisioned to triage, respond, and begin to recover.
Evidence gathering and preservation must include proper documentation and handling. The first step is to create a backup of the system that is believed to be infected to be used as evidence. If possible, a second copy could be made to use as a restore copy once vulnerabilities are remediated. The copies need to be stored safely by the incident response team. As mentioned, getting assistance from the healthcare attorney or human resources, for example, can help ensure chain-of-custody elements are preserved or relevant laws are followed. Sometimes, evidence collected in these incidents is used by law enforcement agencies in court cases. Those law enforcement personnel may not have access to the systems as early in the process as the incident response team and will rely on the validity of the evidence collected. A detailed log should be kept for all evidence, including the following:6
•Identifying information (for example, the location, serial number, model number, hostname, media access control [MAC] addresses, and IP addresses of a computer)
•Name, title, and phone number of each individual who collected or handled the evidence during the investigation
•Time and date (including time zone) of each occurrence of evidence handling
•Locations where the evidence was stored
Additional activities the healthcare information security and privacy professional can be expected to accomplish include the following:
•Be sure to revisit detection and analysis because it is common to discover additional systems that are impacted by the same incident cause.
•Conduct a thorough investigation.
•Begin eradication once cause and symptoms are considered contained.
•Identify and mitigate all vulnerabilities that were exploited.
•Remove malware, inappropriate materials, and other components.
•Make required changes to information systems (add patches, change code, remove access, and so on).
•Minimize newly discovered vulnerabilities resulting from a security incident.
•Report incident status and resolution information to senior management and the information systems help desk to assist any end users who are reporting concerns.
•Assist senior management in all communications to be made in community updates and notification activities to the media, regulators, and affected individuals.
•Act as liaison with upper management and other teams and organizations, defusing crisis situations, and ensuring that the team continues to have necessary personnel and resources.
•Assist with bringing the systems back to production.
•Confirm normal operations.
•Unintended consequences can occur. Short-term oversight of active systems is necessary.
•Implement additional or improved monitoring in case of another incident.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6641)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6363)
Machine Learning Security Principles by John Paul Mueller(6333)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(6001)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(5965)
Solidity Programming Essentials by Ritesh Modi(4072)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3713)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3441)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Future Crimes by Marc Goodman(3351)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Blockchain Basics by Daniel Drescher(3308)
Learn Computer Forensics - Second Edition by William Oettinger(3199)
Incident Response with Threat Intelligence by Roberto Martínez(2930)
Mobile App Reverse Engineering by Abhinav Mishra(2889)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Code Book by Simon Singh(2837)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2819)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2787)
