02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

incoming information, 74<br />

priority scales, 98<br />

privacy issues, 118, 124<br />

privacy laws, 102, 114, 173<br />

proactive services, 65, 86, 114, 133<br />

probes, 93, 103<br />

procedural law, 116<br />

procedures. See policies and procedures<br />

process guidelines, 137<br />

processes, 14, 86, 87, 88, 133, See also<br />

policies and procedures<br />

product security teams, 44<br />

productivity loss, 64<br />

pr<strong>of</strong>essional development, 78<br />

project leaders, 4<br />

projects, CSIRT, 118<br />

protocol flaws, 109<br />

public<br />

outreach, 34<br />

relations, 5, 73, 75<br />

services, 55<br />

public key cryptography, 105<br />

Putting on <strong>the</strong> Gloves, 101<br />

Queensland University <strong>of</strong> Technology, 27,<br />

63<br />

racist acts, 116<br />

rapid response, 12<br />

RARE CERT Task Force, 23<br />

reactive services, 65, 86, 114<br />

recording data, 89, 91, 94<br />

recovery, 12, 18, 64, 99<br />

Red Siren, 159<br />

registered teams, 21, 32, 38, 40, 42, 43, 45<br />

regulations, 11, 33, 64, 75, 93<br />

Remedy HelpDesk and Action Request<br />

System, 94<br />

repair costs, 64<br />

repeatable process, 136<br />

reporting<br />

guidelines, 84<br />

incidents, 85<br />

structures, 49, 51, 52<br />

reputation, 76, 85<br />

Request Tracker for <strong>Incident</strong> <strong>Response</strong>, 94<br />

requirements for establishing a CSIRT<br />

capability, 135<br />

research, 128<br />

networks, 26, 42, 45, 52<br />

sponsorship, 55<br />

Réseaux Associés pour la Recherche<br />

Européene, 23<br />

Responding to <strong>Computer</strong> <strong>Security</strong><br />

<strong>Incident</strong>s: Guidelines for <strong>Incident</strong><br />

Handling, 153<br />

response, 86, 133<br />

and recovery, 12<br />

capability, 56, 64<br />

plans, 111<br />

services, 90<br />

strategies, 12, 98<br />

response team network, 20<br />

responsibilities, staff, 51, 74, 77<br />

retaining information, 93<br />

revenue loss, 64<br />

Reynolds, J., 17<br />

RFC<br />

1135, 17<br />

1244, 154<br />

2196 Site <strong>Security</strong> Handbook, 154<br />

2350, 34, 84, 124<br />

2828, 83<br />

3227, 124<br />

risk, 11, 65, 66, 85<br />

assessments, 76<br />

data, 12<br />

management, 5, 76<br />

mitigation, 12<br />

models, 64<br />

Rogers, Stephanie, xiv<br />

roles, staff, 51, 77<br />

Rosenthal, Sheila, xiv<br />

routers, 111<br />

RTIR, 94<br />

sabotage, 61<br />

SafeBack, 101<br />

Safer Internet Action Plan, 116<br />

SAGE, 78, 108<br />

salary costs, 56, 57, 60<br />

SANS, 82, 92, 101, 126, 159<br />

SANS <strong>Security</strong> Alert, 57<br />

SC Magazine, 163<br />

scanning, 11, 61, 93, 103, 109<br />

scope<br />

<strong>of</strong> CSIRT activity, 85<br />

<strong>of</strong> incidents, 93<br />

search and seizure, 102<br />

Searching and Seizing <strong>Computer</strong>s and<br />

Obtaining Electronic Evidence in<br />

Criminal Investigations, 115<br />

secretarial staff, 73<br />

Section 1030, 118<br />

CMU/SEI-2003-TR-001 269

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!