With the number of cyber-attacks reaching well above tens of millions on a daily basis, cyber security should be at the top of mind for nearly every modern business. Cyber threats are a now on the priority agenda for IT departments of organizations of any size and nature.In case the of a cyber incident the response teams follow the incident handling process defined beforehand. Sophisticated monitoring tools can help to identify a breach before it gets out of hand and advanced diagnostics will assist in classifying the impact of the attack. Well defined incident response techniques help in quick resolution of cyber incidents.
With respect to cyber incident handling, we here present a detailed checklist that might be used for as a one stop solution for cyber incident handling. The entire process can be categorized into six main steps, each with its further deep digging. The following outline is intended to
be a checklist of actions appropriate to dealing with the threat and a compromise accomplished by the threat. However, customized tailoring to each environment and situation is warranted and recommended.
The incident handling process has been categorized into six steps as mentioned in the above figure. The key aspects to be focused in each step is as follows: