Pethia et al., 1990 - Google Patents
Computer emergency response-An international problemPethia et al., 1990
View PDF- Document ID
- 1041468681104316256
- Author
- Pethia R
- van Wy K
- Publication year
- Publication venue
- Pittsburgh, Pa.: CERT Coordination Center., Software Engineering Institute, Carnegie Mellon University
External Links
Snippet
. Conclusions It has been shown that the CERT concept can be an effective means of responding to computer a security-related incidents [Graf90]. In incidents prior to the existence of CERT, system dministrators were frequently at a loss for outside assistance …
- 101710014200 CERT1 0 description 56
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fraser | Site security handbook | |
Bace et al. | Intrusion detection systems | |
Holbrook et al. | Site security handbook | |
Rawal et al. | Cybersecurity and identity access management | |
Smith | Forming an incident response team | |
Fraser | RFC2196: Site security handbook | |
Bacik | Building an effective information security policy architecture | |
Pethia et al. | Computer emergency response-An international problem | |
Wack | Establishing a computer security incident response capability (CSIRC) | |
Doddrell | Information security and the Internet | |
Holbrook et al. | RFC1244: Site Security Handbook | |
Dubin | The little black book of computer security | |
Hajdarevic | Cyber Security Audit in Business Environments | |
Wright | Business hacking: A case study of business information systems | |
Garrison et al. | Computer security awareness of accounting students | |
Smith | A secure Email gateway (building an RCAS external interface) | |
Martsenyuk et al. | Features of technology of protection against unauthorizedly installed monitoring software products. | |
Gnatyuk et al. | MODEL OF PARAMETERS FOR EARLY DETECTION OF APT ATTACKS AND IDENTIFICATION OF SECURITY INTRUDERS IN CYBERSPACE: MODEL OF PARAMETERS FOR EARLY DETECTION OF APT ATTACKS AND IDENTIFICATION OF SECURITY INTRUDERS IN CYBERSPACE | |
Erfani Torbaghani | Students’ Perception of Cyber Threat Severity: Investigating Alignment with Actual Risk Levels | |
Crabb | Guarding The Fortress Efficient Methods To Monitor Security on 300 Systems | |
Brown | Security evaluation of Unix networks | |
Brown | llhIIIiI/II/IiIII/II/Im SIi/I o3 0 9J. jh. 3 | |
Baran et al. | Security breaches: Five recent incidents at Columbia university | |
Breitrose | Hackers hit ISPs by the dozens | |
Allen et al. | Detecting Signs of Intrusion |