Prerequisites for building a computer security incident response capability

被引:0
|
作者
Mooi, Roderick [1 ,2 ]
Botha, Reinhardt A. [2 ]
机构
[1] CSIR, Meraka Inst, New Delhi, India
[2] Nelson Mandela Metropolitan Univ, Sch ICT, Ctr Res Informat & Comp Secur, Port Elizabeth, South Africa
关键词
incident response; security team; CSIRT; CERT; establishing requirements;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are a number of considerations before one can commence with establishing a Computer Security Incident Response Team (CSIRT). This paper presents the results of a structured literature review investigating the business requirements for establishing a CSIRT. That is, the paper identifies those things that must be in place prior to commencing with the actual establishment process. These include characterising the CSIRT environment, funding, constituency, authority and legal considerations. Firstly, we identified authoritative CSIRT literature. Thereafter we identified salient aspects using a concept matrix. The study enumerates five areas of primary business requirements. Finally, a holistic view of the business requirements is provided by summarising the decisions required in each area.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A MANAGEMENT MODEL FOR BUILDING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY
    Mooi, Roderick D.
    Botha, Reinhardt A.
    SAIEE AFRICA RESEARCH JOURNAL, 2016, 107 (02): : 78 - 91
  • [2] On Computer Security Incident Response Teams
    Horne, Bill
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 13 - 15
  • [3] Should corporate management include a Computer Forensics and Incident Response capability into realigned Information Security Principles?
    Wright, Paul
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2009, 10 : 15 - 22
  • [4] Testing your computer security incident response plan
    Markey, Steve
    ISACA Journal, 2012, 2
  • [5] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [6] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870
  • [7] Context for the SA NREN Computer Security Incident Response Team
    Mooi, Roderick
    Botha, Reinhardt A.
    2016 IST-AFRICA WEEK CONFERENCE, 2016,
  • [8] Computer Security Incident Response Team Effectiveness: A Needs Assessment
    Van der Kleij, Rick
    Kleinhuis, Geert
    Young, Heather
    FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [9] Methodology for Computer Security Incident Response Teams into IoT Strategy
    Enciso Bernal, Alejandro
    Martinez Monterrubio, Sergio Mauricio
    Parra Puente, Javier
    Gonzalez Crespo, Ruben
    Verdu, Elena
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (05): : 1909 - 1928
  • [10] An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
    Chen, Tiffani R.
    Shore, Daniel B.
    Zaccaro, Stephen J.
    Dalal, Reeshad S.
    Tetrick, Lois E.
    Gorab, Aiva K.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 61 - 67