16.04.2014 Views

vPLfv

vPLfv

vPLfv

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Acknowledgements<br />

We would like to express our deep appreciation to our colleagues in the incident handling and<br />

broader security community who reviewed this report. Their comments, recommendations,<br />

and suggestions helped us clarify our terms and ideas, think of our next steps, and make this<br />

report more useful and readable.<br />

Julia Allen<br />

Henk Bronk<br />

Dawn Cappelli<br />

Rich Caralli<br />

Byron Collie<br />

Katherine Fithen<br />

Cristine Hoepers<br />

Klaus-Peter Kossakowski<br />

Barbara Laswell<br />

Rob McMillan<br />

Damon Morda<br />

David Mundie<br />

Sofie Nystrøm<br />

Don Stikvoort<br />

Moira West-Brown<br />

Pamela Williams<br />

We would like to acknowledge and thank the following people for their contributions, support,<br />

and assistance in the production of this document:<br />

• Barbara Laswell – who not only provides us with the time, resources, and encouragement<br />

to continue our research and project work, but who also asks the hard questions that help<br />

us to crystallize our thoughts and ideas.<br />

• William Wilson – for sharing with us the talents of Chris Alberts and Audrey Dorofee,<br />

the authors of Managing Information Security Risks: The OCTAVE Approach.<br />

• Julia Allen and Rich Caralli – for sharing with us their ideas and evolving thoughts on<br />

enterprise security management and for exploring with us the synergies between that<br />

work and our CSIRT development work.<br />

CMU/SEI-2004-TR-015<br />

xiii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!