Computer Security Incident Response Team Development and Evolution

  title={Computer Security Incident Response Team Development and Evolution},
  author={Robin Ruefle and Audrey J. Dorofee and David A. Mundie and Allen D. Householder and Michael Murray and Samuel J. Perl},
  journal={IEEE Security & Privacy},
When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs. Organized incident management requires defined, repeatable processes and the ability to learn from incidents that threaten the confidentiality, availability, and integrity of critical systems and data. Some organizations assign responsibility for… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 10 extracted citations

Computer Security

Lecture Notes in Computer Science • 2018

Dimensional data model for early alerts of malicious activities in a CSIRT

2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) • 2017
View 1 Excerpt

Collaborative DDoS defense using flow-based security event information

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium • 2016
View 2 Excerpts


Publications referenced by this paper.
Showing 1-5 of 5 references

An Introduction to the Mission Risk Diagnostic for Incident Management Capabilities (MRD-IMC),

C. J. Alberts
Carnegie Mellon Univ. Software Eng. Inst., • 2014

Latest 100 Gigabit Attack Is One of Internet’s Largest,

S. M. Kerner
eWeek, 1 Oct • 2013

U.S. Says Ring Stole 160 Million Credit Card Numbers,

N. Popper, S. Sengupta
New York Times, • 2013

I3P Project: What Makes a Good CSIRT?,

S. L. Pfleeger
US Dept. Homeland Security, • 2012

Incident Management Capability Metrics Version 0.1,

A. J. Dorofee
Carnegie Mellon Univ. Software Eng. Inst., • 2007

Similar Papers

Loading similar papers…