SlideShare a Scribd company logo
Information Security Incident Report Form
Name:
Email address:
Telephone/Mobile number:
Date of report:
Incident detection date:
Has the incident been resolved (yes/no)
Organization name and address:
Incident Overview
Location of incident (site)
Nature of Incident (select all that apply)
(a) Suspicious system and network activities
(b) Compromise of sensitive information
(c) Unauthorized access or attempts to access a system
(d) Emails with suspicious attachments or links
(e) Denial of service attacks
(f) Suspected tampering of electronic devices
(g) Malware infection
• Cryptlocker
• Coin miner
• Remote access trojan
• Credential harvesting malware
• Botnet
• Other malware (describe)
(h) Reconnaissance (scanning/probing)
(i) Social engineering
(j) Account compromise
Incident Severity
(a) None/Negligible (suspicious activity only)
(b) Minor (Impacts single computer, non-privileged account)
(c) Moderate (Impacts part of the organization’s infrastructure)
(d) High (impact’s organization’s entire infrastructure/privileged accounts)
(e) Very High (has impact beyond the organization)
How did the organization become aware of the incident?
Provide a general description of the incident:
Incident Report
Incident Impact (select all that apply)
(a) Loss of access to services
(b) Loss of productivity
(c) Loss of reputation
(d) Loss of revenue
(e) Propagation to other networks
(f) Unauthorized disclosure of data/information
(g) Unauthorized modification of data/information
(h) Unknown/Other (please describe)
What steps were taken to investigate the nature and severity of the incident?
What systems were impacted?
• IP addresses of affected systems:
• FQDN of affected systems:
• Role of affected systems (Domain controller/DNS/DHCP/Web Server):
• Operating systems of affected systems:
• Patch level of affected systems:
• Security software on affected systems:
• Physical location of affected systems:
• Additional details:
Which applications were impacted?
What unauthorized data access occurred?
Which privileged user accounts were impacted?
Which unprivileged user accounts were impacted?
Which third parties were impacted (Vendors/Contractors/Partners)
Sensitivity of Compromised Data (select all that apply)
(a) Confidential/Sensitive data
(b) Non-sensitive data
(c) Publicly available data
(d) Financial data
(e) Personally identifiable information (PII)
(f) Intellectual property
(g) Critical infrastructure/key resources
(h) Other (describe)
What would the consequences be of the data that was accessed in an unauthorized manner
becoming public?
What is the time frame of the incident?
Suspected initial date/time of compromise:
Detection date/time:
Incident remediation date/time:
How did the breach occur? (select all that apply)
(a) DDoS
(b) Malware
(c) Misconfiguration
(d) Phishing
(e) Vulnerability exploit
(f) Unknown
Suspected perpetrators:
(a) Insider
(b) Former staff
(c) Other
(d) Unknown
Estimated total cost incurred: (Cost to contain incident, restore systems, notify stakeholders)
What steps have been taken to remediate the cause of and vulnerabilities related to the incident?
What additional controls should be in place to prevent the incident reoccurring?
Do any authorities need to be notified about the details of the incident?
Additional impact information:

More Related Content

PDF
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
PDF
Understanding Network Insight Integrations to Automate Containment and Kick S...
PPTX
Introduction To Vulnerability Assessment & Penetration Testing
PPTX
PIDS research slides from MALCON 2018 conference - Asaf Hecht
PPTX
VAPT, Ethical Hacking and Laws in India by prashant mali
PDF
Verizon Breach Investigation Report (VBIR).pdf
PDF
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
PPTX
information security awareness course
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
Understanding Network Insight Integrations to Automate Containment and Kick S...
Introduction To Vulnerability Assessment & Penetration Testing
PIDS research slides from MALCON 2018 conference - Asaf Hecht
VAPT, Ethical Hacking and Laws in India by prashant mali
Verizon Breach Investigation Report (VBIR).pdf
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
information security awareness course

Similar to Incident report-final (20)

PDF
Why My E Identity Needs Protection
PPT
Ethical Hacking
PPTX
Cyber security for business
ODP
Securing GIS data
PDF
Hacking and protecting yourself from hackers .
PPTX
Using Big Data to Counteract Advanced Threats
PDF
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
PDF
Computer security
PDF
Security and Privacy.PDF
PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
PPTX
Regan, Keller, SF State Securing the vendor mr&ak
PPT
Lecture8 to identify the (Cyber Crime).ppt
PDF
distinguishing-threat-actors-vectors-and-intelligence-sources-slides.pdf
PDF
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
PPTX
Online security and payment system
PPTX
Threats to system power point 1
PDF
CH1- Introduction to malware analysis-v2.pdf
PDF
Incident handling is a clearly defined set of procedures to manage and respon...
PPTX
Intrusion Detection Systems Pedagogy.pptx
PPTX
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
Why My E Identity Needs Protection
Ethical Hacking
Cyber security for business
Securing GIS data
Hacking and protecting yourself from hackers .
Using Big Data to Counteract Advanced Threats
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Computer security
Security and Privacy.PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
Regan, Keller, SF State Securing the vendor mr&ak
Lecture8 to identify the (Cyber Crime).ppt
distinguishing-threat-actors-vectors-and-intelligence-sources-slides.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
Online security and payment system
Threats to system power point 1
CH1- Introduction to malware analysis-v2.pdf
Incident handling is a clearly defined set of procedures to manage and respon...
Intrusion Detection Systems Pedagogy.pptx
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
Ad

More from MichaelRodriguesdosS1 (12)

PDF
Post naval thesis in cyber security
PDF
Ims16 thesis-knabl-v1.1
PDF
Convolutional Neural Networks
PDF
Bitcoin Crime Investigation
PDF
Malware Analysis
PDF
AWS Pentesting
PDF
Investigation in deep web
PDF
Incident report-final
PDF
Hipaa basics
PDF
Iot developer-survey-2019
PDF
Securing io t_with_aws
PDF
Incident Response
Post naval thesis in cyber security
Ims16 thesis-knabl-v1.1
Convolutional Neural Networks
Bitcoin Crime Investigation
Malware Analysis
AWS Pentesting
Investigation in deep web
Incident report-final
Hipaa basics
Iot developer-survey-2019
Securing io t_with_aws
Incident Response
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
The AUB Centre for AI in Media Proposal.docx
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Incident report-final

  • 1. Information Security Incident Report Form Name: Email address: Telephone/Mobile number: Date of report: Incident detection date: Has the incident been resolved (yes/no) Organization name and address: Incident Overview Location of incident (site) Nature of Incident (select all that apply) (a) Suspicious system and network activities (b) Compromise of sensitive information (c) Unauthorized access or attempts to access a system (d) Emails with suspicious attachments or links (e) Denial of service attacks (f) Suspected tampering of electronic devices (g) Malware infection • Cryptlocker • Coin miner • Remote access trojan • Credential harvesting malware • Botnet • Other malware (describe) (h) Reconnaissance (scanning/probing) (i) Social engineering (j) Account compromise Incident Severity (a) None/Negligible (suspicious activity only) (b) Minor (Impacts single computer, non-privileged account) (c) Moderate (Impacts part of the organization’s infrastructure) (d) High (impact’s organization’s entire infrastructure/privileged accounts) (e) Very High (has impact beyond the organization) How did the organization become aware of the incident? Provide a general description of the incident:
  • 2. Incident Report Incident Impact (select all that apply) (a) Loss of access to services (b) Loss of productivity (c) Loss of reputation (d) Loss of revenue (e) Propagation to other networks (f) Unauthorized disclosure of data/information (g) Unauthorized modification of data/information (h) Unknown/Other (please describe) What steps were taken to investigate the nature and severity of the incident? What systems were impacted? • IP addresses of affected systems: • FQDN of affected systems: • Role of affected systems (Domain controller/DNS/DHCP/Web Server): • Operating systems of affected systems: • Patch level of affected systems: • Security software on affected systems: • Physical location of affected systems: • Additional details: Which applications were impacted? What unauthorized data access occurred? Which privileged user accounts were impacted?
  • 3. Which unprivileged user accounts were impacted? Which third parties were impacted (Vendors/Contractors/Partners) Sensitivity of Compromised Data (select all that apply) (a) Confidential/Sensitive data (b) Non-sensitive data (c) Publicly available data (d) Financial data (e) Personally identifiable information (PII) (f) Intellectual property (g) Critical infrastructure/key resources (h) Other (describe) What would the consequences be of the data that was accessed in an unauthorized manner becoming public? What is the time frame of the incident? Suspected initial date/time of compromise: Detection date/time: Incident remediation date/time: How did the breach occur? (select all that apply) (a) DDoS (b) Malware (c) Misconfiguration (d) Phishing (e) Vulnerability exploit (f) Unknown Suspected perpetrators: (a) Insider (b) Former staff (c) Other (d) Unknown Estimated total cost incurred: (Cost to contain incident, restore systems, notify stakeholders) What steps have been taken to remediate the cause of and vulnerabilities related to the incident?
  • 4. What additional controls should be in place to prevent the incident reoccurring? Do any authorities need to be notified about the details of the incident? Additional impact information: