02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Arvidsson 03]<br />

Arvidsson, J., ed. “Taxonomy <strong>of</strong> <strong>the</strong> <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> related<br />

terminology.” TERENA <strong>Incident</strong> Taxonomy and Description<br />

Working Group http://www.terena.nl/tech/task-forces<br />

/tf-csirt/iodef/docs/i-taxonomy_terms.html.<br />

[AusCERT 01]<br />

Australian <strong>Computer</strong> Emergency <strong>Response</strong> Team. The Methodology<br />

<strong>of</strong> <strong>Incident</strong> Handling. http://www.mncc.com.my/infosec2k1/panel4-<br />

3.pdf (2001).<br />

[AusCERT 03]<br />

Australian <strong>Computer</strong> Emergency <strong>Response</strong> Team (AusCERT).<br />

http://www.auscert.org.au/ (2003).<br />

[Australia 02]<br />

AusCERT; Deloitte Touche Tohmatsu; & The New South Wales Police.<br />

“2002 Australian <strong>Computer</strong> Crime and <strong>Security</strong> Survey.”<br />

http://www.auscert.org.au/Information/Auscert_info/2002cs.pdf<br />

(2002).<br />

[Australia 03]<br />

AusCERT, Australian Federal Police; Queensland Police, South Australian<br />

Police, Western Australian Police. “2003 Australian <strong>Computer</strong><br />

Crime and <strong>Security</strong> Survey.”<br />

http://www.auscert.org.au/download.html?f=65 (2003).<br />

[Berinato 01] Berinato, Scott. “Coming Up ROSI.” cso online.com, October 26,<br />

2001. http://www.csoonline.com/alarmed/10262001.html.<br />

[Berinato 02a]<br />

Berinato, Scott. “Finally, a Real Return on <strong>Security</strong> Spending.” CIO<br />

Magazine, February 15, 2002.<br />

http://www.cio.com/archive/021502/security.html.<br />

[Berinato 02b]<br />

Berinato, Scott. “The <strong>Security</strong> Spending Mystery.” cso online.com,<br />

April 25, 2002. http://www.csoonline.com/alarmed/04252002.html.<br />

[Brezinski 02]<br />

Brezinski, D. & Killalea, T. “Guidelines for Evidence Collection and<br />

Archiving” (RFC 3227). Internet Engineering Task Force.<br />

ftp://ftp.isi.edu/in-notes/rfc3227.txt (2002).<br />

[Brownlee 98]<br />

Brownlee, N. & Guttman, E. Expectations for <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong><br />

<strong>Response</strong>. http://www.ietf.org/rfc/rfc2350.txt?number=2350<br />

(1998).<br />

248 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!