← Back to Modules

🚨 Module 6: Incident Response

Learn how to recognize, respond to, and report security incidents effectively.

📚 Training Content

What is a Security Incident?

A security incident is any event that compromises the confidentiality, integrity, or availability of an organisation's information assets or violates security policies.

Examples:

  • Clicking a phishing link
  • Malware infection
  • Unauthorised access to systems
  • Data breach or leak
  • Lost or stolen device with sensitive data
  • Suspicious account activity
  • Ransomware attack

Why Reporting Quickly Matters

Time is critical in cybersecurity incidents. The faster you report, the faster the security team can:

  • Contain the threat before it spreads
  • Prevent data theft or system damage
  • Protect other users and systems
  • Preserve evidence for investigation
  • Meet legal and regulatory reporting requirements

Remember: It's always better to report a false alarm than to miss a real threat. Security teams would rather investigate something harmless than respond too late to something serious.

The Incident Response Process

1. Preparation: Have plans, tools, and trained personnel ready before incidents occur.

2. Identification: Recognize and confirm that a security incident has occurred.

3. Containment: Limit the scope and damage of the incident.

  • Short-term: Immediate action to stop the spread (disconnect infected device, disable compromised account)
  • Long-term: Temporary fixes while permanent solutions are developed

4. Eradication: Remove the threat from the environment (delete malware, close vulnerabilities).

5. Recovery: Restore systems to normal operations, verify they're clean.

6. Lessons Learned: Review what happened, what worked, what didn't, and how to improve.

What to Report

Always report these situations immediately:

For serious incidents: You may also need to report to external bodies such as the Australian Cyber Security Centre (via ReportCyber at cyber.gov.au), IDCARE (for identity theft), or the Office of the Australian Information Commissioner (OAIC) if there's a data breach.

How to Report an Incident

Document the Following:

Reporting Channels:

Immediate Actions If You Suspect an Incident

If You Clicked a Suspicious Link:

  1. Don't panic
  2. Disconnect from network immediately
  3. Don't shut down (may delete evidence)
  4. Report to IT/security immediately
  5. Document what you clicked and when
  6. Change passwords from a different, clean device

If Your Device is Acting Strange:

  1. Disconnect from network
  2. Document symptoms
  3. Don't delete anything
  4. Report to IT/security
  5. Don't reconnect until cleared by security

If Your Account May Be Compromised:

  1. Change password immediately (from secure device)
  2. Enable MFA if not already active
  3. Review recent account activity
  4. Report to security team
  5. Check for unauthorised changes to account settings

What NOT to Do

Post-Incident Review: Learning from Incidents

After an incident is resolved, the security team conducts a "lessons learned" review:

Your Role: Participate honestly in reviews. The goal is improvement, not blame.

Building a Security Culture

Everyone plays a role in cybersecurity:

Key Takeaways

📝 Test Your Knowledge

Test your understanding of incident response!

QUESTION 1 OF 4
What should be your FIRST action if you discover a potential security breach?
QUESTION 2 OF 4
Which of these situations should be reported as a security incident?
QUESTION 3 OF 4
What information should you document when reporting a security incident?
QUESTION 4 OF 4
After a security incident is resolved, what's an important next step?

Quiz Complete!

0%
Back to Modules