afterward. The aim of this framework is to give a
thorough description of why and how organizations
should plan for security incident management, con-
duct business impact analysis and explain various
measures to improve information security in organi-
zations. We also detailed the role of CSIRTs within
the incident management. It can provide a set of
comprehensive policies and procedures for analyzing,
reporting, and responding to computer security inci-
dents. Our proposed model defines roles and respon-
sibilities to ensure accountability; also, it defines in-
terfaces and communication channels with support-
ing policies and procedures for coordination across
processes and process actors in a distributed manner.
Furthermore, it can be integrated into different types
of organizations and security management processes.
As future work, we plan to analyze data analytics
methodologies and architectures used in conjunction
with decision support systems, which will allow orga-
nizations to take actions based on institutional knowl-
edge. We aim at implementing an architecture and in-
frastructure of solutions such as Big data and artificial
intelligence applied to cybersecurity.
ACKNOWLEDGMENTS
The authors would like to thank the financial support
of the Ecuadorian Corporation for the Development
of Research and the Academy (RED CEDIA) for the
development of this work, under Project Grant GT-II-
2018 (Cybersecurity).
REFERENCES
Ab Rahman, N. H. and Choo, K.-K. R. (2015). A survey
of information security incident handling in the cloud.
Computers & Security, 49:45–69.
Ahmad, A., Hadgkiss, J., and Ruighaver, A. B. (2012). Inci-
dent response teams–challenges in supporting the or-
ganisational security function. Computers & Security,
31(5):643–652.
Anderson, R., Barton, C., B
¨
ohme, R., Clayton, R.,
Van Eeten, M. J., Levi, M., Moore, T., and Savage,
S. (2013). Measuring the cost of cybercrime. In The
economics of information security and privacy, pages
265–300. Springer.
Baskerville, R., Spagnoletti, P., and Kim, J. (2014).
Incident-centered information security: Managing a
strategic balance between prevention and response.
Information & Management, 51(1):138 – 151.
Brownlee, N. and Guttman, E. (1998). Expectations for
computer security incident response. Technical report.
Bustamante, F., Fuertes, W., D
´
ıaz, P., and Toulkeridis, T.
(2016). A methodological proposal concerning to
the management of information security in Industrial
Control Systems. In Ecuador Technical Chapters
Meeting (ETCM), IEEE, pages 1–6. IEEE.
Bustamante, F., Fuertes, W., D
´
ıaz, P., and Toulkeridis, T.
(2017). Integration of IT frameworks for the manage-
ment of information security within industrial control
systems providing metrics and indicators. In Electron-
ics, Electrical Engineering and Computing (INTER-
CON), 2017 IEEE XXIV International Conference on,
pages 1–4. IEEE.
Cichonski, P., Millar, T., Grance, T., and Scarfone, K.
(2012). Computer security incident handling guide.
NIST Special Publication, 800(61):1–147.
Cusick, J. J. and Ma, G. (2010). Creating an itil inspired
incident management approach: Roots, response, and
results. In Network Operations and Management Sym-
posium Workshops (NOMS Wksps), 2010 IEEE/IFIP,
pages 142–148. IEEE.
Daley, R., Millar, T., and Osorno, M. (2011). Operationaliz-
ing the coordinated incident handling model. In Tech-
nologies for homeland security (HST), 2011 IEEE in-
ternational conference on, pages 287–294. IEEE.
ENISA (2017). Annual Incident Reports 2016. Techni-
cal report, European network and information security
agency (ENISA).
ENISA (2018). Annual Report Telecom Security Incidents
2017. Technical report, European network and infor-
mation security agency (ENISA).
Fuertes, W., Reyes, F., Valladares, P., Tapia, F., Toulk-
eridis, T., and P
´
erez, E. (2017). An Integral Model
to Provide Reactive and Proactive Services in an Aca-
demic CSIRT Based on Business Intelligence. Sys-
tems, 5(4):52.
Gabriel, R., Hoppe, T., Pastwa, A., and Sowa, S. (2009).
Analyzing malware log data to support security in-
formation and event management: Some research re-
sults. In 2009 First International Conference on Ad-
vances in Databases, Knowledge, and Data Applica-
tions, pages 108–113. IEEE.
Harang, R. and Guarino, P. (2012). Clustering of snort
alerts to identify patterns and reduce analyst work-
load. In MILITARY COMMUNICATIONS CONFER-
ENCE, 2012-MILCOM 2012, pages 1–6. IEEE.
Hove, C., Tarnes, M., Line, M. B., and Bernsmed, K.
(2014). Information security incident management:
identified practice in large organizations. In IT Se-
curity Incident Management & IT Forensics (IMF),
2014 Eighth International Conference on, pages 27–
46. IEEE.
ISO/IEC 27001:2013 (2013). Information technology – Se-
curity techniques – Information security management
systems – Requirements . Standard, International Or-
ganization for Standardization, Geneva, CH.
ISO/IEC 27035-1:2011 (2011). Information technology –
Security techniques – Information security incident
management . Standard, International Organization
for Standardization, Geneva, CH.
Kral, P. (2011). The incident handlers handbook.
Macas, M., Lagla, L., Fuertes, W., Guerrero, G., and Toulk-
eridis, T. (2017). Data mining model in the discovery
A Structured Approach to Guide the Development of Incident Management Capability for Security and Privacy
335