02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[OCIPEP 03]<br />

Office <strong>of</strong> Critical Infrastructure Protection and Emergency Preparedness.<br />

http://www.ocipep.gc.ca/home/index_e.asp (2003).<br />

[Oppenheimer 97] Oppenheimer, David L.; Wagner, David A.; & Crabb, Michele D.<br />

“System <strong>Security</strong>: A Management Perspective.” Short Topics in System<br />

Administration, Thousand Oaks, CA: SAGE Publications, Inc.,<br />

1997.<br />

[Potter 02] Potter, C. & Smith, G. “Information <strong>Security</strong> Breaches Survey 2002,<br />

Executive Summary.” Available from http://www.securitysurvey.gov.uk/<br />

(2002).<br />

[Power 02]<br />

Power, Richard. 2002 CSI/FBI <strong>Computer</strong> Crime and <strong>Security</strong> Survey.<br />

<strong>Computer</strong> <strong>Security</strong> Institute.<br />

http://www.gocsi.com/press/20020407.html (2002).<br />

[Rand 03]<br />

Rand Europe. <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> Team Handbook<br />

<strong>of</strong> Legislative Procedures. http://www.iaac.org.uk/csirt.htm (2003).<br />

[Rezmierski 98]<br />

Rezmierski, V.; Carroll, A.; & Hine, J. ”<strong>Incident</strong> Cost Analysis and<br />

Modeling Project (ICAMP) I.” http://www.cic.uiuc.edu/groups/CIC<br />

/listICAMPreports.shtml (1998).<br />

[Rezmierski 00]<br />

Rezmierski, V.; Carroll, A.; & Hine, J. ”<strong>Incident</strong> Cost Analysis and<br />

Modeling Project (ICAMP) II.” http://www.cic.uiuc.edu/groups/CIC<br />

/listICAMPreports.shtml (2000).<br />

[Richardson 03]<br />

Richardson, Robert. 2003 CSI/FBI <strong>Computer</strong> Crime and <strong>Security</strong><br />

Survey. http://www.gocsi.com/press/20030528.jhtml (2003).<br />

[Rothke 02] Rothke, Ben. “Parts <strong>of</strong> <strong>the</strong> Plan.” Info<strong>Security</strong> News Magazine 13, 8<br />

(2002).<br />

[SANS 98]<br />

The SANS Institute. <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> Handling Step-by-<br />

Step. The SANS Institute, October, 1998.<br />

[SANS 03]<br />

The SANS Institute. <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> Handling Step-by-<br />

Step. The SANS Institute, October, 2003. Information on how to acquire<br />

this guide is available at http://store.sans.org/.<br />

254 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!