02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

incident handling, 84<br />

reporting, 92<br />

sample, 130, 179<br />

Guidelines and Recommendations for<br />

<strong>Incident</strong> Processing, 34<br />

Guidelines for Evidence Collection and<br />

Archiving, 115, 124<br />

hacker attacks, 58, 103<br />

hacker scanning tools, 61<br />

Hacker’s Challenge, 130<br />

Handbook for CSIRTs, xiii, 5, 6, 48, 53,<br />

72, 78, 87, 109, 139<br />

Handlers Diary, 126<br />

harassment, 103<br />

harmful code, 58<br />

Harvey, Christopher C., 20<br />

HB-171-2003, 124<br />

health care providers, 118<br />

health insurance, 118<br />

Health Insurance Portability and<br />

Accountability Act (HIPAA), 118<br />

Heiser, J., 92<br />

Helminthiasis <strong>of</strong> <strong>the</strong> Internet, The, 17<br />

help desks, 55, 67, 73, 74, 88, 94, 102<br />

high bandwidth, 112<br />

high-stress positions, 79<br />

high-tech crime, 117<br />

hiring regulations, 77<br />

HKCERT/CC, 29<br />

Hoepers, Cristine, xiii<br />

home users, 112<br />

Honeynet Project, 128<br />

Hong Kong <strong>Computer</strong> Emergency<br />

<strong>Response</strong> Team Coordination Center,<br />

29<br />

host systems, 17<br />

hotline, 19, 68, 71, 73, 74, 88, 102<br />

hours <strong>of</strong> operation, 102<br />

human resources, 5, 73, 75<br />

hurricane severity levels, 97<br />

Hysert, Ronald H., 20<br />

IAP, 116<br />

ICAMP, 58, 59, 60<br />

IDCERT, 29<br />

IDMEF, 94, 121<br />

IDS, 67, 68, 70, 88, 123, 125<br />

IETF, 34, 84, 93, 121<br />

IHT, 13<br />

illegal s<strong>of</strong>tware, 58<br />

improvement, 86, 133<br />

INCH, 25<br />

INCH Working Group, 84, 122<br />

incident<br />

analysis, 13, 66, 71<br />

analysts, 73<br />

cost model, 59<br />

costs, 58, 62<br />

data, 67<br />

data exchange, 135<br />

definition <strong>of</strong>, 82<br />

detection services, 12<br />

handlers, 74, 114<br />

level, 95<br />

life cycle, 87<br />

management, 85, 86<br />

priority, 95<br />

reporting forms, 89, 92, 125, 131<br />

reporting procedures, 82<br />

reports, 66, 95<br />

scope, 93<br />

severity, 95<br />

statistics, 112, 120<br />

tracking systems, 62, 75, 122<br />

<strong>Incident</strong> Cost Analysis and Modeling<br />

Project. See ICAMP<br />

incident handling<br />

by early European teams, 23<br />

by platform specialists, 75<br />

definition <strong>of</strong>, 13<br />

field, 78, 133<br />

guidelines, 84<br />

knowledge, sharing <strong>of</strong>, 49<br />

methodologies, 134<br />

procedures, 85<br />

service, 65, 66<br />

skills, 78<br />

staff, 73, 128<br />

time data, 59<br />

tools, 122, 127<br />

training, 79<br />

<strong>Incident</strong> Handling Step-by-Step, 82, 101<br />

<strong>Incident</strong> Handling Working Group. See<br />

INCH Working Group, See INCH<br />

<strong>Incident</strong> Object Description and Exchange<br />

Format. See IODEF<br />

incident response<br />

activities, 86<br />

capability, xi<br />

checklist, 85<br />

CSIRT authority for, 53<br />

definition <strong>of</strong>, 13, 83<br />

field, 2, 133<br />

CMU/SEI-2003-TR-001 265

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!