02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kruse and Heiser<br />

In <strong>the</strong>ir book <strong>Computer</strong> Forensics, <strong>Incident</strong> <strong>Response</strong> Essentials, Kruse and Heiser have included<br />

an appendix that provides details on “Internet Data <strong>Incident</strong> <strong>Response</strong> Guidelines”<br />

[Kruse 02]. They cover <strong>the</strong> goals <strong>of</strong> incident response, roles and responsibilities <strong>of</strong> staff involved<br />

in incident response, an incident severity chart, and information on incident handling<br />

processes. They have provided several process flow charts for handling different types <strong>of</strong> incident<br />

activity (Figures A-10, A-11, and A-12, pages 347, 348, and 349), a few <strong>of</strong> which have<br />

been reproduced here. Appendix B provides an <strong>Incident</strong> <strong>Response</strong> Form template (pages 353-<br />

361), which has also been included here.<br />

CMU/SEI-2003-TR-001 195

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!