Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus

被引:5
|
作者
Villegas-Ch, William [1 ]
Ortiz-Garces, Ivan [1 ]
Sanchez-Viteri, Santiago [2 ]
机构
[1] Univ Las Amer, FICA, Escuela Ingn Tecnol Informac, Quito 170125, Ecuador
[2] Univ Int Ecuador, Dept Sistemas, Quito 170411, Ecuador
关键词
informatics security; cybersecurity; CSIRT; CSIRT; MODEL;
D O I
10.3390/computers10080102
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Currently, society is going through a health event with devastating results. In their desire to control the 2019 coronavirus disease, large organizations have turned over the execution of their activities to the use of information technology. These tools, adapted to the use of the Internet, have been presented as an effective solution to the measures implemented by the majority of nations where quarantines are generalized. However, the solution given by information technologies has several disadvantages that must be solved. The most important in this regard is with the serious security incidents that exist, where many organizations have been compromised and their data has been exposed. As a solution, this work proposes the design of a guide that allows for the implementation of a computer incident response team on a university campus. Universities are optimal environments for the generation of new technologies; they also serve as the ideal test bed for the generation of security policies and new treatments for incidents in an organization. In addition, with the implementation of the computer incident response team in a university, it is proposed to be part of a response group to any security incident at the national level.
引用
收藏
页数:23
相关论文
共 23 条
  • [1] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [2] Context for the SA NREN Computer Security Incident Response Team
    Mooi, Roderick
    Botha, Reinhardt A.
    2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [3] Computer Security Incident Response Team Effectiveness: A Needs Assessment
    Van der Kleij, Rick
    Kleinhuis, Geert
    Young, Heather
    FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [4] University Security Incident and Construction of Safety and Harmony University Campus
    Yang Zhiwu
    PROCEEDINGS OF THE 2010 CHINESE SEMINAR ON THE PRINCIPLES OF SAFETY SCIENCE AND TECHNOLOGY, 2010, : 695 - 699
  • [5] On Computer Security Incident Response Teams
    Horne, Bill
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 13 - 15
  • [6] Operational Framework Proposal for ESPOL University 2.0 Smart Campus Implementation
    Recalde, Angel
    Endara, Ivan
    Quimis, Marco
    Romero, Cristhian
    2017 IEEE SECOND ECUADOR TECHNICAL CHAPTERS MEETING (ETCM), 2017,
  • [7] Forming a critical incident response team in a maximum security setting
    Guariglia, MJ
    Smith, H
    FEDERAL PROBATION, 1995, 59 (02) : 40 - &
  • [8] Testing your computer security incident response plan
    Markey, Steve
    ISACA Journal, 2012, 2
  • [9] Prerequisites for building a computer security incident response capability
    Mooi, Roderick
    Botha, Reinhardt A.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [10] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870