[go: up one dir, main page]

Pethia et al., 1990 - Google Patents

Computer emergency response-An international problem

Pethia et al., 1990

View PDF
Document ID
1041468681104316256
Author
Pethia R
van Wy K
Publication year
Publication venue
Pittsburgh, Pa.: CERT Coordination Center., Software Engineering Institute, Carnegie Mellon University

External Links

Snippet

. Conclusions It has been shown that the CERT concept can be an effective means of responding to computer a security-related incidents [Graf90]. In incidents prior to the existence of CERT, system dministrators were frequently at a loss for outside assistance …
Continue reading at cisre.egr.uh.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Fraser Site security handbook
Bace et al. Intrusion detection systems
Holbrook et al. Site security handbook
Rawal et al. Cybersecurity and identity access management
Smith Forming an incident response team
Fraser RFC2196: Site security handbook
Bacik Building an effective information security policy architecture
Pethia et al. Computer emergency response-An international problem
Wack Establishing a computer security incident response capability (CSIRC)
Doddrell Information security and the Internet
Holbrook et al. RFC1244: Site Security Handbook
Dubin The little black book of computer security
Hajdarevic Cyber Security Audit in Business Environments
Wright Business hacking: A case study of business information systems
Garrison et al. Computer security awareness of accounting students
Smith A secure Email gateway (building an RCAS external interface)
Martsenyuk et al. Features of technology of protection against unauthorizedly installed monitoring software products.
Gnatyuk et al. MODEL OF PARAMETERS FOR EARLY DETECTION OF APT ATTACKS AND IDENTIFICATION OF SECURITY INTRUDERS IN CYBERSPACE: MODEL OF PARAMETERS FOR EARLY DETECTION OF APT ATTACKS AND IDENTIFICATION OF SECURITY INTRUDERS IN CYBERSPACE
Erfani Torbaghani Students’ Perception of Cyber Threat Severity: Investigating Alignment with Actual Risk Levels
Crabb Guarding The Fortress Efficient Methods To Monitor Security on 300 Systems
Brown Security evaluation of Unix networks
Brown llhIIIiI/II/IiIII/II/Im SIi/I o3 0 9J. jh. 3
Baran et al. Security breaches: Five recent incidents at Columbia university
Breitrose Hackers hit ISPs by the dozens
Allen et al. Detecting Signs of Intrusion