SITSA Attack Summary

613 Words2 Pages

Once the team has assembled and once the SITSA has completed the formalities associated with communicating to company leaders and stakeholders, the next stage is to begin assessing and analyzing the attack. Brandon (2014) provides the following guidelines for security analysts and those charged with evaluating the attack in terms of its specific dimensions. These include the processes of isolating the impacted networking components; protecting critical infrastructures against further compromise; detecting the source of the intrusion; analyzing the components and signatures associated with it; and making clear assessments based on this aggregate data. In total, this effort can be viewed as a strategy that analyzes an attack in terms of its technical aspects and the likely qualitative aspects connected with the attacker. The task of analyzing the attack in terms of its technical dimensions can also be …show more content…

O`Mara (2016) notes that forensic assessment of network damage can also function as a form of post-event data that can reveal the extent of the attack perpetrated. This element coupled with subsequent analyses of the network after the event can also help inform assessments of the attack`s broader effects. Identifying the perpetrators signature can also help profile the attackers and determine if these events were coordinated or isolated, and if the same attackers have been implicated in similar events recently. Law enforcement agencies can also sometimes provide information that can help identify a specific attacker. This approach can also help identify if the attacks were singular in nature or connected to other events. These subsequent analyses can, collectively, help frame and identify an attacker`s motives, which can also help organizational IT analysts understand the reasons for why the attack

Open Document