State of the Practice of Computer Security Incident Response Teams ...
State of the Practice of Computer Security Incident Response Teams ...
State of the Practice of Computer Security Incident Response Teams ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TWCERT, 29<br />
TW-CIRC, 29<br />
types <strong>of</strong> incidents, 103<br />
UNAM-CERT, 30, 31<br />
unauthorized access, 11, 61, 103, 109, 118<br />
United Kingdom, 103<br />
United Nations, 169<br />
United Nations Convention Against<br />
Transnational Organized Crime, 117<br />
United Nations General Assembly, 117<br />
United <strong>State</strong>s<br />
Army, 79<br />
<strong>Computer</strong> Emergency <strong>Response</strong><br />
Team, 34<br />
CSIRTs, 19, 33<br />
cyber crime laws, 118<br />
Department <strong>of</strong> Defense, 80<br />
Department <strong>of</strong> Defense Information<br />
Technology <strong>Security</strong> Certification<br />
and Accreditation Process, 174<br />
Department <strong>of</strong> Energy, 19, 21<br />
Department <strong>of</strong> Homeland <strong>Security</strong>, 34<br />
Department <strong>of</strong> Justice, 115<br />
Department <strong>of</strong> Justice, <strong>Computer</strong><br />
Crime and Intellectual Property<br />
Section, 118<br />
Department <strong>of</strong> National Defence<br />
CIRT, 32<br />
Department <strong>of</strong> <strong>the</strong> Army <strong>Response</strong><br />
Team, 21<br />
Department <strong>of</strong> <strong>the</strong> Navy, 82<br />
federal laws, 169<br />
federal requirements, 173<br />
Secret Service, 84, 92, 115<br />
state laws, 175<br />
university networks, 52<br />
University <strong>of</strong> Queensland, The, 27, 63<br />
UNIX, 101<br />
US-CERT, 34<br />
user compromises, 103<br />
van Wyk, K., 92<br />
VBS, 95<br />
Vermont, <strong>State</strong> <strong>of</strong>, 82, 85<br />
victims, 105, 130<br />
viruses, 61, 68, 93, 103<br />
Vorfallsbearbeitungssystem, 95<br />
vulnerabilities, 110, 113<br />
vulnerability<br />
analysts, 73<br />
assessments, 12, 68<br />
disclosure, 135<br />
handlers, 75<br />
handling, 68, 75<br />
scanning, 68<br />
walk-in reports, 89<br />
WANK, 20, 21<br />
war stories, 130<br />
web defacement, 60<br />
West-Brown, Moira, xiii<br />
Williams, Pam, xiv<br />
wiretapping, 61<br />
workflows, 134<br />
working groups, 25, 28, 29<br />
workload, 90, 91, 129<br />
worms, 17, 20, 61, 103<br />
xenophobic acts, 116<br />
XML, 25, 122, 123<br />
272 CMU/SEI-2003-TR-001