• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Management » System Concepts » What is incident response?
Next →
← Prev

What is incident response?

By Dinesh Thakur

We’ll be covering the following topics in this tutorial:

  • What is an Incident?
  • Incident Response Process
  • Some Attack Techniques and Technologies

What is an Incident?

An incident in the parlance of information security is a security breach or even an attempt to breach security. An unsuccessful attempt to crack the security system is also an incident and needs to be investigated thoroughly.

Incident Response Process

Whenever an incident takes place, a series of steps needs to be taken to find out the causes of the incident to ensure that such incidents do not occur in future. The incident response process involves the following steps:

  1. Incident identification – it is the first step of incident response in which the incident is identified. Some common incidents may be DoS, port scanning, IP sniffing, social engineering, banner capture, unauthorized access or virus infection.
  2. Incident classification – it is the next step in which the incident is classified based on its severity. Every organization must maintain an incident classification chart to rate an incident when it occurs based on its criticality.
  3. Incident notification – it is the notification given to specific functionaries about the incident.
  4. Incident response and containment – it is the action taken to thwart the incident.
  5. Incident recovery – it is the recovery activity to restore system to the previous status.
  6. Post mortem – this is the post incident investigation to find out the vulnerabilities in the system that allowed the incident to happen.

                                                        Incidence Response Flow Chart

Some Attack Techniques and Technologies

Some of the attack tools and techniques are:

  1. IP spoofing is a the techniques of using forged 12 digit IP address (source) in the IP packets that are used in TCPIIP protocol for data communication (primarily on the Internet or on any other TCP/IP network) for concealing the identity of the sender or impersonating another computing system.
  2. Packet sniffing is a technique or a program to troubleshoot network traffic. However, often it is used by hackers to get information about the source and destination of IP packets on a TCP/IP network. When on a TCP/IP network like Internet, data is broken down into small packets that are transmitted over the network and gather together at the destination, reassembled and displayed/stored etc. these packets have stamps of destination and source on them so that they are not lost. Packet sniffing is the technique of that can capture these floating packets on the TCP/IP network like a wiretap and find out what is being sent to or from a source or destination.




You’ll also like:

  1. Response Status Code in Servlet.
  2. Servlet to create cookies and add them to the response header
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

MIS Tutorials

MIS Tutorials

  • MIS - Home
  • MIS - Classification
  • MIS - Characteristics
  • MIS - Implementation
  • MIS - Benefits
  • MIS - System Types
  • MIS - Simon’s Model
  • MIS - Different Systems
  • MIS - Open Vs Closed Systems
  • MIS - Different Functional IS
  • MIS - System Maintenance
  • MIS - MIS Functions
  • MIS - Information
  • MIS - Systems Approach
  • MIS - DSS
  • MIS - Information System Types
  • MIS - Deterministic Vs Probabilistic
  • MIS - System Analyst Role
  • MIS - MIS Planning
  • MIS - QoI
  • MIS - Types of System
  • MIS - Role of Information
  • MIS - Quality of Information
  • MIS - Home
  • MIS - Traditional Vs Modern Marketing
  • MIS - Development Approaches
  • MIS - Organizational Need
  • MIS - Nolan's Six-stage Model
  • MIS - Decisions Types
  • MIS - Selecting Hardware
  • MIS - Management Levels
  • MIS - Information Dimensions
  • MIS - System Design
  • MIS - Systems Types
  • MIS - Information Value
  • MIS - Business Strategy
  • MIS - Management Reports
  • MIS - Anthony's Framework
  • MIS - System Characteristics
  • MIS - Information Systems
  • MIS - Types of IS
  • MIS - Structure
  • MIS - Problems in Implementing
  • MIS - Limitations
  • MIS - Planning
  • MIS - Stages of Development
  • MIS - Conceptual Design
  • MIS - Four Stage Model
  • MIS - Prerequisites
  • MIS - System Investigation Stages
  • MIS - DSS Classification
  • MIS - Subsystems
  • MIS - Business Expert Systems
  • MIS - Nolan Stage Model
  • MIS - Control Systems Types
  • MIS - SQA Benefit
  • MIS - Development Factors
  • MIS - Systems Approach
  • MIS - Decision Support System
  • MIS - Efficiency and Effectiveness

Other Links

  • MIS - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW