Incident Handling Forms
Essay Preview: Incident Handling Forms
Report this essay
Introduction
An incident handling form is important when responding to a computer security incident. These forms provide a uniform document that captures pertinent information when an incident occurs. The subsequent sections of this paper will examine the different Incident Handling Forms available.

Overview of the different Incident Handling Forms
Incident Handling Forms can be categorized into two groups. First, we will discuss Security Incident Forms. This group includes Incident Contact List, Incident Identification, Incident Survey, Incident Containment, Incident Eradication and Incident Communication Log (Sample Incident, 2016).

Last, there are Intellectual Property Incident Handling Forms. These include Incident Form Checklist, Incident Contacts, Incident Identification, Incident Containment, Incident Eradication and Incident Communication Log (Sample Incident, 2016).

Additionally, this paper will also discuss the Chain of Custody Form.
Incident Handling Forms- Security Incident
The Incident Contact List form is three pages long. The form consists of contact information for people to contact in case of an emergency. The contacts include, Corporate Security Officer, Corporate Incident Handling CIRT or FIRST, Corporate Legal Affairs Officers, etc.

The Incident Identification form is a page long. The form consists of two sections, the general information and Incident Summary. The Incident Detector’s has information relating to the person that detected the information. The Incident Summary asks for incident specific information.

The Incident Survey form is a page long. The form consists of a survey section. The form asks questions about the arrival time of the incident handler, location of incident, etc.

The Incident Containment form is a page long. The form consists of sections regarding the affected systems. The form asks questions about the isolated affected system and backup affected system.

The next form is the Incident Eradication form. This form is a page long. The form consists of sections regarding the incident. The form asks questions about the person performing the forensic tasks and vulnerability identified.

The Incident Communication Log form is a page long. The form consists of sections regarding the communication involved during the incident. The form asks questions about the initiator and receiver involved when reporting an incident.

Incident Handling Forms- Intellectual Property
Incident Form Checklist is a page long. The form consists of sections regarding the Security Incident Forms. The form asks questions about the Incident Contact List, Incident Identification, Incident Survey, Incident Containment, Incident Eradication and Incident Communication Log.

Incident

Get Your Essay

Cite this page

Incident Handling Form And Computer Security Incident. (June 27, 2021). Retrieved from https://www.freeessays.education/incident-handling-form-and-computer-security-incident-essay/