A Resource View of Information Security Incident Response
Total Page:16
File Type:pdf, Size:1020Kb
Bentley University Scholars @ Bentley 2018 Dissertations and Theses Spring 2018 A Resource View of Information Security Incident Response Mark-David J. McLaughlin Follow this and additional works at: https://scholars.bentley.edu/etd_2018 Part of the Information Security Commons ©Copyright 2018 Mark-David J. McLaughlin A Resource View of Information Security Incident Response Mark-David J. McLaughlin A dissertation submitted in partial fulfillment of the requirements for the degree of Ph.D. in Business 2018 Program Authorized to Offer Degree: Information and Process Management ProQuest Number:10787183 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. ProQuest 10787183 Published by ProQuest LLC ( 2018). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 ABSTRACT A Resource View of Information Security Incident Response Mark-David J. McLaughlin Chair of the Supervisory Committee: Janis L. Gogan, D.B.A. Information and Process Management Department This dissertation investigates managerial and strategic aspects of InfoSec incident preparation and response. This dissertation is presented in four chapters: • Chapter 1: an introduction • Chapter 2: a systematic literature review • Chapter 3: two field-based case studies of InfoSec incident response processes • Chapter 4: a repertory grid study identifying characteristics of effective individual incident responders. Together these chapters demonstrate that the lenses of the Resource Based View, Theory of Complementary Resources, and Accounting Control Theory, can be combined to classify and analyze the resources organizations use during incident response. I find that incident response is maturing as a discipline and organizations rely on both defined procedures and improvisation when incidents occur. Most importantly there is no “one size fits all” approach to incident response. Incident responder characteristics include general skills (good communicators and problem solvers) and character attributes (such as an interest in “doing the right thing”).The combination of characteristics that make an individual successful in a particular incident response role is affected by other resources available to support InfoSec incident response. v TABLE OF CONTENTS ABSTRACT ............................................................................................................................... v TABLE OF CONTENTS ............................................................................................................ vi LIST OF FIGURES .................................................................................................................. viii LIST OF TABLES ...................................................................................................................... xi LIST OF APPENDICIES ........................................................................................................... xii CHAPTER 1 INTRODUCTION ................................................................................................. 1 Overview ................................................................................................................... 1 Information Security Management: Background ......................................................... 3 InfoSec in the Basket (Chapter 2) ............................................................................... 4 A Focused Literature Review: InfoSec Incident Response .......................................... 6 Two Incident Response Cases (Chapter 3) ................................................................ 15 Characteristics of Effective InfoSec Incident Responders (Chapter 4) ....................... 19 Future InfoSec Incident Response Research that Builds on Prior Findings ................ 22 Increase InfoSec Research Methods Diversity .......................................................... 27 Conclusion ............................................................................................................... 30 CHAPTER 2 AN INFOSEC LITERATURE REVIEW IN THE BASKET ................................ 31 Introduction ............................................................................................................. 32 Review Method ........................................................................................................ 35 Key Findings: A Practitioner Relevant Framework ................................................... 38 Lit Review Findings: How do Organizations Respond to InfoSec Incidents? ............ 40 How do Organizations Detect InfoSec Incidents? ..................................................... 40 How do Organizations Prevent InfoSec Incidents?.................................................... 42 How do Organizations Prepare to Handle InfoSec Incidents? .................................... 48 Is InfoSec Research in the Basket Diverse? .............................................................. 55 Implications for Research ......................................................................................... 59 Implications for Practice .......................................................................................... 62 CHAPTER 3 TWO CASES ON INCIDENT RESPONSE ......................................................... 67 Introduction ............................................................................................................. 68 Research Method ..................................................................................................... 70 Case Summaries and Links to Theoretical Frameworks ............................................ 75 Theories Applied to the Incident Response Cases ..................................................... 77 InfoSec Theories and Frameworks............................................................................ 81 Model of Information Security Process (Andress 2014) ............................................ 82 Applying ACT to the Three InfoSec Models............................................................. 85 vi CASE 1: ......................................................................................................................................... 88 SNOWFALL AND A STOLEN LAPTOP .................................................................................... 88 Snow Falling on Rochester ........................................................................................... 88 URGENT: Laptop Stolen ............................................................................................. 89 RIT and the Saunders College of Business .................................................................. 89 IT Governance and Structure at RIT ............................................................................ 91 Dave Ballard’s Response .............................................................................................. 94 Moving On.................................................................................................................... 97 All’s Well That Ends Well ........................................................................................... 99 Suggested Student Case Preparation Questions ........................................................... 99 Acknowledgements ...................................................................................................... 99 Exhibit 1: Excerpt from The Reporter (RIT student-run publication) ........................ 100 Exhibit 2: Excerpt from University News (RIT News/Public Relations Division) ..... 100 Exhibit 3: RIT Information Security Policy ............................................................... 101 Exhibit 3: RIT Acceptable Use Policy ....................................................................... 102 Exhibit 4: RIT Information Classifications ................................................................ 106 CASE 2: ....................................................................................................................................... 107 A HIGH PERFORMANCE COMPUTING CLUSTER UNDER ATTACK: THE TITAN INCIDENT ................................................................................................................................... 107 Introduction ................................................................................................................ 107 Credentials and Identity Theft .................................................................................... 108 High Performance Computing and Incident Response at UiO ................................... 110 The Mass Compromise of Multinational Research Accounts .................................... 113 Suggested Student Case Preparation Questions ......................................................... 118 Exhibit 1: Vulnerability Alert ..................................................................................... 119 Exhibit 2: UniNETT Trouble Ticket .......................................................................... 120 CHAPTER 4 FROM INFOSEC INCIDENT