Corpus ID: 15287918

A Guide to Establishing Computer Security Incident Response Team ( CSIRT ) For National Research and Education Network ( NREN )

@inproceedings{Wara2015AGT,
  title={A Guide to Establishing Computer Security Incident Response Team ( CSIRT ) For National Research and Education Network ( NREN )},
  author={Y. M. Wara},
  year={2015}
}
Academic institutions worldwide embrace communication network and Internet services for their academic activities and collaboration. Communication network enable members of institutions to collaborate with each other and as well access Internet. Therefore, sophisticated cyber-attack emanating from one segment of the network or from the greater Internet can undoubtedly trigger crisis that can affect various stakeholders both within and outside the academic institutions. Consequently, a… Expand

Figures from this paper

Prioritizing computer security incident response services for the South African National Research Network (SANReN)
TLDR
This paper aims to propose an informed selection and prioritization of initial services for the SA NREN CSIRT, an academic sector CSIRT in South Africa, using the first two stages of the IT Infrastructure Library (ITIL) service portfolio management process. Expand
Context for the SA NREN Computer Security Incident Response Team
The South African (SA) National Research and Education Network (NREN) identified the requirement for a Computer Security Incident Response Team (CSIRT). This paper sets the context for the CSIRT byExpand
A Management Model for Building a Computer Security Incident Response Capability
TLDR
This paper reports on the first three activities in design science research: identifying the problem, listing solution objectives, and designing and developing a model for establishing a Computer Security Incident Response Team (CSIRT). Expand
An overview of the digital forensic investigation infrastructure of Ghana
TLDR
The paper assesses the effectiveness of legal infrastructure, technical mechanisms, the availability of capacity building programs, organisational infrastructure as well as the existence of cooperation mechanisms among relevant institutions in Ghana to conclude that DFI is still at an infant stage. Expand
An architecture for e-learning infrastructures on a national level: a case study of the Afghanistan Research and Education Network
TLDR
An e-learning architecture based on the Afghanistan Research and Education Network (AfgREN) provides guidance for the rapid development of different e- learning services and learning-analytical infrastructure for Afghanistan. Expand
Best Practices to Minimize Data Security Breaches for Increased Business Performance
Best Practices to Minimize Data Security Breaches for Increased Business Performance by Fedinand Jaiventume Kongnso MISM, Walden University, 2010 BBA, Viterbo University, 2006 Doctoral StudyExpand
Strategies Used by Cloud Security Managers to Implement Secure Access Methods
TLDR
The findings from this research may contribute to positive social by decreasing customers’ concerns regarding personal information that is stored on the cloud being compromised. Expand
Strategies to Minimize the Effects of Information Security Threats on Business Performance.
Strategies to Minimize the Effects of Information Security Threats on Business Performance by Stella Ifeyinwa Okoye MBA, University of Bradford, 2012 MSc, Nnamdi Azikiwe University, Awka, Nigeria,Expand

References

SHOWING 1-9 OF 9 REFERENCES
Fostering a Secure Framework for National Research and Education Network
In the context of management of network services, wide-spread deployment and security problems requiring considerable human efforts and involvement, secure and distributed management mechanism becomeExpand
Handbook for Computer Security Incident Response Teams (CSIRTs)
Abstract : This document provides guidance on the generic issues to consider when forming and operating a computer security incident response team (OSIRT). In particular, it helps an organization toExpand
Proposition of Model for CSIRT: Case Study of Telecommunication Company in a Province of Iran
Attack to software, network and system is cause of computer security incidents. Computer Security Incident Response Capability (CSIRC) prevent from attacks by responding, predictive and safetyExpand
Common challenges faced during the establishment of a CSIRT
  • M. Grobler, H. Bryk
  • Business, Computer Science
  • 2010 Information Security for South Africa
  • 2010
TLDR
A number of common problems faced during the establishment of a CSIRT are looked at, within the set of chronological steps. Expand
Applicable vision, mission and the effects of strategic management on crisis resolve
Abstract The accelerated transportation created by globalization required the companies to differentiate themselves in order to compete, and this situation reflected on management strategies. WithinExpand
The Significance of Vision and Mission Development for Enterprises in Slovak Republic
Vision and mission are often considered as an essential part of strategic management. There is probably not a strategic management book that does not mention or explain the importance of these twoExpand
ORGANIZATIONAL STRUCTURE, INTEGRATION, AND MANUFACTURING PERFORMANCE: A CONCEPTUAL MODEL AND PROPOSITIONS
TLDR
This work draws on organizational structure and resource-based view theoretical perspectives to present a conceptual model that proposes a relationship between organization structure and integration and introduces a series of propositions to be subject to empirical scrutiny. Expand
West - Brown , Don Stikvoort , Klaus - Peter Kossakowski , Georgia Killcrece Robin Ruefle & Mark Zajicek
  • Fostering a Secure Framework for National Research and Education Network . Proceedings and reports of the 4 th UbuntuNet Alliance annual conference
  • 2011
Computer Security Incident Response Teams (CSIRTs)