AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Incident Handling Forms

Essay by   •  September 24, 2017  •  Essay  •  640 Words (3 Pages)  •  1,072 Views

Essay Preview: Incident Handling Forms

Report this essay
Page 1 of 3

Introduction

An incident handling form is important when responding to a computer security incident. These forms provide a uniform document that captures pertinent information when an incident occurs. The subsequent sections of this paper will examine the different Incident Handling Forms available.

Overview of the different Incident Handling Forms

Incident Handling Forms can be categorized into two groups. First, we will discuss Security Incident Forms. This group includes Incident Contact List, Incident Identification, Incident Survey, Incident Containment, Incident Eradication and Incident Communication Log (Sample Incident, 2016).

Last, there are Intellectual Property Incident Handling Forms. These include Incident Form Checklist, Incident Contacts, Incident Identification, Incident Containment, Incident Eradication and Incident Communication Log (Sample Incident, 2016).

Additionally, this paper will also discuss the Chain of Custody Form.

Incident Handling Forms- Security Incident

The Incident Contact List form is three pages long. The form consists of contact information for people to contact in case of an emergency. The contacts include, Corporate Security Officer, Corporate Incident Handling CIRT or FIRST, Corporate Legal Affairs Officers, etc.

The Incident Identification form is a page long. The form consists of two sections, the general information and Incident Summary. The Incident Detector’s has information relating to the person that detected the information. The Incident Summary asks for incident specific information.

The Incident Survey form is a page long. The form consists of a survey section. The form asks questions about the arrival time of the incident handler, location of incident, etc.

The Incident Containment form is a page long. The form consists of sections regarding the affected systems. The form asks questions about the isolated affected system and backup affected system.

The next form is the Incident Eradication form. This form is a page long. The form consists of sections regarding the incident. The form asks questions about the person performing the forensic tasks and vulnerability identified.

The Incident Communication Log form is a page long. The form consists of sections regarding the communication involved during the incident. The form asks questions about the initiator and receiver involved when reporting an incident.

Incident Handling Forms- Intellectual Property

Incident Form Checklist is a page long. The form consists of sections regarding the Security Incident Forms. The form asks questions about the Incident Contact List, Incident Identification, Incident Survey, Incident Containment, Incident Eradication and Incident Communication Log.

Incident

...

...

Download as:   txt (4.5 Kb)   pdf (58.2 Kb)   docx (9.4 Kb)  
Continue for 2 more pages »
Only available on AllBestEssays.com