02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Kossakowski 00]<br />

Kossakowski, Klaus-Peter & Stikvoort, Don. “A Trusted CSIRT Introducer<br />

in Europe: An Empirical Approach Towards Trust Inside <strong>the</strong><br />

European <strong>Incident</strong> <strong>Response</strong> Scene—The Replacement <strong>of</strong> Trust by<br />

Expectations.” Amersfoort, NL: M&I/Stelvio, 2000. (Commissioned<br />

by TERENA.)<br />

[Kruse 02]<br />

Kruse, Warren G., II & Heiser, Jay G. <strong>Computer</strong> Forensics, <strong>Incident</strong><br />

<strong>Response</strong> Essentials. Reading, MA: Addison-Wesley, 2002.<br />

[Lundberg 01]<br />

Lundberg, Abbie. “Effective <strong>Response</strong>s to <strong>Security</strong> <strong>Incident</strong>s.”<br />

http://www.cio.com/research/security/response.html (2001).<br />

[Mandia 01]<br />

Mandia , Kevin & Prosise, Chris. <strong>Incident</strong> <strong>Response</strong>: Investigating<br />

<strong>Computer</strong> Crime. Berkeley, CA: Osborne/McGraw-Hill, 2001.<br />

[Marcella 02]<br />

Marcella, Albert J. & Greenfield, Robert S., Ed. Cyber Forensics: A<br />

Field Manual for Collecting, Examining, and Preserving Evidence <strong>of</strong><br />

<strong>Computer</strong> Crimes. Boca Raton, FL: CRC Press LLC, 2002.<br />

[McGlashan 01]<br />

McGlashan, Mat<strong>the</strong>w. “The Methodology <strong>of</strong> <strong>Incident</strong> Handling.”<br />

Info<strong>Security</strong> 2001 Conference Program. Malaysian National <strong>Computer</strong><br />

Confederation, 2001. http://www.mncc.com.my<br />

/infosec2001-detail6.html (2001).<br />

[Mendell 01]<br />

Mendell, Ronald L. “<strong>Incident</strong> Management with Law Enforcement.”<br />

<strong>Security</strong>Focus Online. http://online.securityfocus.com/infocus/1523<br />

(2001).<br />

[MyCERT 03]<br />

Malaysia CERT (MyCERT). http://www.mycert.mimos.my/.<br />

[Navy 96]<br />

Department <strong>of</strong> <strong>the</strong> Navy. <strong>Computer</strong> <strong>Incident</strong> <strong>Response</strong> Guidebook,<br />

Module 19 (NAVSO P-5239-19). http://www.nswc.navy.mil<br />

/ISSEC/Guidance/P5239-19.html (1996).<br />

[Nebraska 02]<br />

<strong>State</strong> <strong>of</strong> Nebraska. “<strong>Incident</strong> <strong>Response</strong> and Reporting Procedure for<br />

<strong>State</strong> Government” (Draft). Nebraska Information Technology Commission,<br />

April 2002. http://www.nitc.state.ne.us/tp/meetings<br />

/documents/20020416/<strong>Incident</strong>_Reporting_Procedure.pdf.<br />

CMU/SEI-2003-TR-001 253

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!