Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Categories
Articles

Using technology to enhance incident response

At last week’s TF-CSIRT meeting, Gavin Reid from Cisco suggested that we may have been over-optimistic about how much technology can do to detect and prevent incidents. Automated incident prevention systems can be effective at detecting and preventing automated attacks but are less effective against targeted attacks that use human intelligence rather than brute force. In the worst case an organisation that relies too much on automation may end up designing its security stance to suit the available automation systems, rather than the other way around.

The presentation was a reminder that technology should aim to enhance the abilities of human incident responders, not to replace them. This gives computers two roles: to perform basic analysis of simple threats themselves and to help humans investigate more complex ones. Cisco’s logging of internal systems and networks has been increased: they now record two trillion log records and thirteen billion flow records every day. Transmitting this volume of information to a central logging system could itself cause problems for the network so it is instead held in local and regional databases around the world. Incident responders can then run distributed queries across all these databases to obtain correlated information about particular events from networks, servers, personal computers and customised monitoring systems. Having complete information about network traffic even allows negatives to be proved: for instance that between the time when a system was compromised and when the compromise was discovered there were no network flows that would indicate the export of sensitive information from it.

This approach needs lots of systems and storage, and smart incident responders to use them, but given that most reports suggest that cybercrime is at least as great a threat as physical crime, shouldn’t we be prepared to spend an equivalent amount to protect against it?

By Andrew Cormack

I'm Chief Regulatory Advisor at Jisc, responsible for keeping an eye out for places where our ideas, services and products might raise regulatory issues. My aim is to fix either the product or service, or the regulation, before there's a painful bump!

Leave a Reply

Your email address will not be published. Required fields are marked *