Computer security incident management

Known as: Incident response 
In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
At present information security (IS) incidents have become not only more numerous and diverse but also more damaging and… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
2015
2015
Industrial reports indicate that security incidents continue to inflict large financial losses on organizations. Researchers and… (More)
  • table 1
Is this relevant?
2014
2014
This paper reports on an interview study on information security incident management that has been conducted in organizations… (More)
Is this relevant?
2014
2014
When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed… (More)
  • figure 1
  • figure 2
Is this relevant?
2014
2014
Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The… (More)
  • figure 1
Is this relevant?
2013
2013
This paper presents a method for evaluating an organization's ability to manage security incidents. The method is based on… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table II
Is this relevant?
2011
2011
We present a holistic, process-oriented approach to ISO/IEC 27001 compliant security incident management that integrates multiple… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Organizations rely on security technology in their efforts to secure their computers and networks. Security technology such as… (More)
  • figure 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Conventional network defense tools such as intrusion detection systems and anti-virus focus on the vulnerability component of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2009
2009
The modern requirements and the best practices in the field of Information Security (IS) Incident Management Process (ISIMP) are… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?