Publications and Research
Document Type
Poster
Publication Date
5-4-2023
Abstract
Cyber-attacks are increasingly prevalent in today's digital age, and their impact can be severe for individuals, organizations, and governments. To effectively protect against these threats, it is essential to understand the different types of attacks and have an incident response plan in place to minimize damage and restore normal operations quickly.
This research aims to contribute to the field by addressing the following questions: What are the main types of cyber-attacks, and how can organizations effectively respond to these incidents? How can the incident response process be improved through post-incident activities?
The study examines various cyber-attack types, including malware, phishing, ransomware, DDoS attacks, and social engineering, and explains the incident response process, which consists of several steps, including Preparation, Identification, Detection and Analysis, Containment, Eradication and Recovery, and Post-Incident Activity. The research highlights the importance of effective incident response and the role of post-incident activities in ensuring continued preparedness and improvement for future incidents.
The study concludes that having a comprehensive incident response plan and understanding various cyber-attack types are vital for organizations to protect against threats and minimize their impact. The research recommends updating policies, training staff, conducting tabletop exercises, and maintaining incident response capability to enhance incident response processes.
Included in
Computer and Systems Architecture Commons, Risk Analysis Commons, Technology and Innovation Commons
Comments
This poster was presented at the 37th Semi-Annual Dr. Janet Liou-Mark Honors & Undergraduate Research Poster Presentation, Dec. 1, 2022. Mentor: Prof. Patrick Slattery (Computer Systems Technology).