02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

function, 66<br />

in Asia Pacific region, 28<br />

laws and regulations, 115<br />

literature, 8<br />

methodology, 131<br />

planning, 109<br />

plans, 9, 84, 112<br />

processes, 83, 131<br />

providers, 15<br />

time data, 59<br />

tools, 127<br />

training, 79<br />

<strong>Incident</strong> <strong>Response</strong>, 56, 151<br />

<strong>Incident</strong> <strong>Response</strong> and Reporting<br />

Procedure for <strong>State</strong> Government, 154<br />

<strong>Incident</strong> <strong>Response</strong>: A Strategic Guide to<br />

Handling System and Network<br />

<strong>Security</strong> Breaches, 151<br />

<strong>Incident</strong> <strong>Response</strong>: Investigating<br />

<strong>Computer</strong> Crime, 151<br />

incidents<br />

number <strong>of</strong>, 104<br />

prevention <strong>of</strong>, 21<br />

types <strong>of</strong>, 58<br />

<strong>Incident</strong>s.org, 126<br />

indirect costs (<strong>of</strong> incidents), 60<br />

Indonesia <strong>Computer</strong> Emergency <strong>Response</strong><br />

Team, 29<br />

information<br />

assets, 11<br />

assurance, 49, 79<br />

disclosure, policies and practices, 75<br />

exchange, 122<br />

security, 56, 79, 85, 118, 157<br />

sharing, 21, 26, 106, 122<br />

systems, 117<br />

Information <strong>Security</strong>, 100<br />

Information <strong>Security</strong> Breaches Survey, 61,<br />

103<br />

information security programs, 160<br />

Information Systems <strong>Security</strong> <strong>Incident</strong><br />

<strong>Response</strong>, 152<br />

Information Systems <strong>Security</strong> Officers<br />

(ISSOs), 4<br />

Info<strong>Security</strong> News, 109<br />

infrastructure attacks, 111<br />

Infrastructure Protection Coordination<br />

Centre, 33<br />

insider abuse, 61<br />

instant messaging, 110<br />

Instituto Tecnológico y de Estudios<br />

Superiores, 30<br />

insurance premiums, 64<br />

intangible costs (<strong>of</strong> incidents), 60<br />

integrity, 77, 116<br />

intellectual property, 118, 170<br />

interface standards, 134<br />

international<br />

cooperation, 116, 117<br />

coordination, 55<br />

cyber crime laws, 116, 165<br />

International Association <strong>of</strong> Chiefs <strong>of</strong><br />

Police, 115<br />

International Information Systems<br />

<strong>Security</strong> Certifications Consortium,<br />

80, 162<br />

International Organization on <strong>Computer</strong><br />

Evidence, 115<br />

International Standards Organization, 4<br />

Internet, 112, 125, 126<br />

Internet Engineering Task Force. See IETF<br />

Internet Glossary, 83<br />

Internet Relay Chat, 110<br />

Internet <strong>Security</strong> Systems, 57, 85<br />

Internet Society, 115<br />

Internet Worm. See Morris Worm<br />

intranets, 92, 105<br />

intruder<br />

activity, 128<br />

attacks, 87<br />

trends, 12<br />

Intrusion Detection Message Exchange<br />

Format, 94<br />

intrusion detection systems. See IDS<br />

Intrusion Detection Working Group, 123<br />

investigations, 5<br />

investigative process, 114<br />

IOCE, 115<br />

IODEF, 25, 91, 94, 119, 121, 122<br />

IRC, 13<br />

Ireland, Terry, xiv<br />

IRF. See incident reporting forms<br />

IRT, 13<br />

ISO 17799, 85<br />

ISPs, 43, 44, 54<br />

ISS, 97<br />

IT<br />

department, 51, 65, 68, 70, 83, 100,<br />

106<br />

help desks, 102<br />

managers, 4, 52<br />

266 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!