02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CIO, 84, 92<br />

CIRC, 13<br />

CIRT, 13<br />

CISSP, 80<br />

civil liability, 114<br />

CLCERT, 30<br />

clearances, 77<br />

Clearinghouse for <strong>Incident</strong> Handling<br />

Tools, 119, 127<br />

CNCERT/CC, 28<br />

Code Red worm, 114<br />

collaboration, 26, 119<br />

collecting evidence, 178<br />

Committee <strong>of</strong> Ministers <strong>of</strong> <strong>the</strong> Council <strong>of</strong><br />

Europe, 116<br />

Common Advisory Interchange Format,<br />

123<br />

Common Body <strong>of</strong> Knowledge, 80<br />

common laws, 114<br />

communication<br />

channels <strong>of</strong>, 112<br />

mechanisms, 18<br />

secure, 105<br />

skills, 76<br />

tools, 101<br />

compliance<br />

department, 51<br />

requirements, 33<br />

compromise, 58<br />

CompTIA, 162<br />

computer crime, 60, 62, 104, 114, 115,<br />

118<br />

computer crime laws, state, 118<br />

<strong>Computer</strong> Emergency <strong>Response</strong> Team, 19<br />

<strong>Computer</strong> Emergency <strong>Response</strong> Team<br />

Coordination Center-Korea. See<br />

CERTCC-KR<br />

<strong>Computer</strong> Emergency <strong>Response</strong> Team for<br />

<strong>the</strong> German Research Network DFN.<br />

See DFN-CERT<br />

computer forensics. See forensics<br />

<strong>Computer</strong> Forensics, <strong>Incident</strong> <strong>Response</strong><br />

Essentials, 151<br />

<strong>Computer</strong> Fraud and Abuse Act, 118<br />

<strong>Computer</strong> <strong>Incident</strong> Advisory Capability,<br />

20, 21<br />

<strong>Computer</strong> <strong>Incident</strong> <strong>Response</strong> Guidebook,<br />

155<br />

computer network attack, 82<br />

<strong>Computer</strong> Network Defense Service<br />

Providers, 80<br />

computer security, 49, 53, 60, 82, 133<br />

experts, 122<br />

incidents, 122<br />

terminology, 134<br />

<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> Handling Step<br />

by Step, 152<br />

<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong><br />

Planning, 97, 153<br />

computer security incident response<br />

teams, ix<br />

computer security incidents, 71, 109<br />

<strong>Computer</strong> <strong>Security</strong> Institute (CSI), 157<br />

<strong>Computer</strong> <strong>Security</strong> Institute/Federal<br />

Bureau <strong>of</strong> Investigation <strong>Computer</strong><br />

Crime and <strong>Security</strong> Survey, 60<br />

<strong>Computer</strong> <strong>Security</strong> Resource and<br />

<strong>Response</strong> Center, 21<br />

CONCERT, 46<br />

confidential information, 106<br />

confidentiality, 116<br />

configuration maintenance, 12<br />

consortium sponsorship, 55<br />

constituencies, 22, 49<br />

contact information, 91, 92, 120<br />

containment, 83, 86<br />

Contingency Planning Guide for<br />

Information Technology Systems, 153<br />

contract services, 55<br />

Convention on Cybercrime, 116<br />

coordination, 21<br />

function, 12<br />

issues, 129<br />

mechanisms, 119, 129, 135<br />

network, 20<br />

<strong>of</strong> teams, 24, 26, 35, 47<br />

with o<strong>the</strong>r external entities, 106<br />

with o<strong>the</strong>r teams, 106<br />

coordination centers, 14, 53, 69, 89, 99,<br />

107, 108<br />

copyright<br />

law, 116, 171<br />

violations, 58<br />

core team, 73, 74<br />

Cormack, Andrew, xiii<br />

Coroner’s Toolkit, The, 101<br />

corporate security, 73<br />

correlating incident activity, 90<br />

correspondence, capturing data from, 91<br />

costs, 137<br />

computer crime, 62<br />

CSIRT, 54, 57<br />

CMU/SEI-2003-TR-001 261

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!