CFP last date
20 January 2025
Reseach Article

Proposed Roles Distribution model for a Computer System Incident Response Team (CSIRT)

by Hosamaldeen Hamd
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 39
Year of Publication: 2023
Authors: Hosamaldeen Hamd
10.5120/ijca2023923194

Hosamaldeen Hamd . Proposed Roles Distribution model for a Computer System Incident Response Team (CSIRT). International Journal of Computer Applications. 185, 39 ( Nov 2023), 4-8. DOI=10.5120/ijca2023923194

@article{ 10.5120/ijca2023923194,
author = { Hosamaldeen Hamd },
title = { Proposed Roles Distribution model for a Computer System Incident Response Team (CSIRT) },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2023 },
volume = { 185 },
number = { 39 },
month = { Nov },
year = { 2023 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number39/32944-2023923194/ },
doi = { 10.5120/ijca2023923194 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:28:10.113288+05:30
%A Hosamaldeen Hamd
%T Proposed Roles Distribution model for a Computer System Incident Response Team (CSIRT)
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 39
%P 4-8
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The process of responding to cyber incidents require professional skills and standard methods, incident’s responder find themselves facing a problem of determining who is responsible to act with the accidents, the consistent between incidents response team heavily required, first to eradicate and fix the incident and/or second, to save time and efforts, in this paper, roles of incident response team were distributed and assigned between the team members, everyone in the team defined his basic and shared role between himself and the other team members, three main roles has been assigned and determined as a comprehensive roles for any response team size which are(risk analysis, alert and warnings, and security consultant)roles.

References
  1. Nyre-Yu, M., Gutzwiller, R.S. and Caldwell, B.S. (2019) ‘Observing cyber security incident response: Qualitative themes from field research’, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 63(1), pp. 437–441. doi:10.1177/1071181319631016.
  2. Nyre-Yu, M., Gutzwiller, R.S. and Caldwell, B.S. (2019) ‘Observing cyber security incident response: Qualitative themes from field research’, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 63(1), pp. 437–441. doi:10.1177/1071181319631016.
  3. Angafor, GN, Yevseyeva, I, He, Y. Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and Privacy. 2020; 3:e126. https://doi.org/10.1002/spy2.126Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Villegas-Ch., W.; Ortiz-Garces, I.; Sánchez-Viteri, S.Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus. Computers 2021, 10, 102. ttps://doi.org/10.3390/computers10080102
  5. Retnowardhani, A., Diputra, R.H. and Triana, Y.S. (2019) ‘Security Risk Analysis of bring your own device system in manufacturing company at Tangerang’, TELKOMNIKA (Telecommunication Computing Electronics and Control), 17(2), p. 753. doi:10.12928/telkomnika.v17i2.10165.
  6. Nasser, M., Ahmad, R., Yassin, W., Hassan, A., Zainal, Z., Salih, N., & Hameed, K. (2018). Cyber-security incidents: A review cases in Cyber-Physical Systems. International Journal of Advanced Computer Science and Applications, 9(1).
  7. Fransen, F., Smulders, A., & Kerkdijk, R. (2015). Cyber security information exchange to gain insight into the effects of cyber threats and incidents. Elektrotechnik Und Informationstechnik, 132(2), 106–112. https://doi.org/10.1007/s00502-015-0289-2
  8. Bhardwaj, A., & Sapra, V. (Eds.). (2021). Security Incidents & Response Against Cyber Attacks. Springer International Publishing.
  9. Austin, G. (2020). Cyber security education: Principles and policies. Routledge Studies in Conflict, Security and Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Incident IR incident response CSIRT roles