02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[van Wyk 01]<br />

van Wyk, Kenneth R. & Forno, Richard. <strong>Incident</strong> <strong>Response</strong>. Sebastopol,<br />

CA: O’Reilly & Associates, Inc., 2001.<br />

[Vermont 01]<br />

<strong>State</strong> <strong>of</strong> Vermont. <strong>Incident</strong> <strong>Response</strong> Procedure.<br />

http://www.cio.state.vt.us/pdfs/sov_intrusion_procedures.pdf (2001).<br />

[Villano 01]<br />

Villano, Matt. “I.T. Autopsy.” CIO.com.<br />

http://www.cio.com/archive/030101/autopsy.html (2001).<br />

[Wack 91]<br />

Wack, John P. “Establishing a <strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong><br />

Capability (CSIRC).” NIST Special Publication 800-3, National Institutes<br />

<strong>of</strong> Standards and Technology.<br />

http://csrc.nist.gov/publications/nistpubs/800-3/800-3.pdf<br />

(1991).<br />

[West-Brown 03]<br />

West-Brown ,Moira J.; Stikvoort, Don; Kossakowski, Klaus-Peter;<br />

Killcrece, Georgia; Ruefle, Robin; & Zajicek, Mark. Handbook for<br />

<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> <strong>Teams</strong> (CSIRTs) (CMU/SEI-<br />

2003-HB-002). Pittsburgh, PA: S<strong>of</strong>tware Engineering Institute, Carnegie<br />

Mellon University, 2003. http://www.sei.cmu.edu<br />

/publications/documents/03.reports/03hb002.html.<br />

[Wood 01]<br />

Wood, Charles Cresson. Information <strong>Security</strong> Policies Made Easy.<br />

San Jose, CA: NetIQ Corp., 2001.<br />

http://www.pentasafe.com/publications/ispme.asp.<br />

[Wright 01]<br />

Wright, Timothy E. “How to Design a Useful <strong>Incident</strong> <strong>Response</strong> Policy.”<br />

<strong>Security</strong>Focus Online.<br />

http://online.securityfocus.com/infocus/1467 (2001).<br />

[Zeichner 03]<br />

Zeichner, Lee & Almosd, Robert. “<strong>State</strong> Implementation <strong>of</strong> Federal<br />

Cyber-<strong>Security</strong> Requirements.” Zeichner Risk Analytics, 2003.<br />

http://www.zra.com/docs/summaryReport.pdf.<br />

CMU/SEI-2003-TR-001 257

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!