02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

TWCERT, 29<br />

TW-CIRC, 29<br />

types <strong>of</strong> incidents, 103<br />

UNAM-CERT, 30, 31<br />

unauthorized access, 11, 61, 103, 109, 118<br />

United Kingdom, 103<br />

United Nations, 169<br />

United Nations Convention Against<br />

Transnational Organized Crime, 117<br />

United Nations General Assembly, 117<br />

United <strong>State</strong>s<br />

Army, 79<br />

<strong>Computer</strong> Emergency <strong>Response</strong><br />

Team, 34<br />

CSIRTs, 19, 33<br />

cyber crime laws, 118<br />

Department <strong>of</strong> Defense, 80<br />

Department <strong>of</strong> Defense Information<br />

Technology <strong>Security</strong> Certification<br />

and Accreditation Process, 174<br />

Department <strong>of</strong> Energy, 19, 21<br />

Department <strong>of</strong> Homeland <strong>Security</strong>, 34<br />

Department <strong>of</strong> Justice, 115<br />

Department <strong>of</strong> Justice, <strong>Computer</strong><br />

Crime and Intellectual Property<br />

Section, 118<br />

Department <strong>of</strong> National Defence<br />

CIRT, 32<br />

Department <strong>of</strong> <strong>the</strong> Army <strong>Response</strong><br />

Team, 21<br />

Department <strong>of</strong> <strong>the</strong> Navy, 82<br />

federal laws, 169<br />

federal requirements, 173<br />

Secret Service, 84, 92, 115<br />

state laws, 175<br />

university networks, 52<br />

University <strong>of</strong> Queensland, The, 27, 63<br />

UNIX, 101<br />

US-CERT, 34<br />

user compromises, 103<br />

van Wyk, K., 92<br />

VBS, 95<br />

Vermont, <strong>State</strong> <strong>of</strong>, 82, 85<br />

victims, 105, 130<br />

viruses, 61, 68, 93, 103<br />

Vorfallsbearbeitungssystem, 95<br />

vulnerabilities, 110, 113<br />

vulnerability<br />

analysts, 73<br />

assessments, 12, 68<br />

disclosure, 135<br />

handlers, 75<br />

handling, 68, 75<br />

scanning, 68<br />

walk-in reports, 89<br />

WANK, 20, 21<br />

war stories, 130<br />

web defacement, 60<br />

West-Brown, Moira, xiii<br />

Williams, Pam, xiv<br />

wiretapping, 61<br />

workflows, 134<br />

working groups, 25, 28, 29<br />

workload, 90, 91, 129<br />

worms, 17, 20, 61, 103<br />

xenophobic acts, 116<br />

XML, 25, 122, 123<br />

272 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!