Context for the SA NREN Computer Security Incident Response Team

被引:0
|
作者
Mooi, Roderick [1 ,2 ]
Botha, Reinhardt A. [2 ]
机构
[1] CSIR, POB 395, ZA-0001 Pretoria, South Africa
[2] Nelson Mandela Metropolitan Univ, POB 77000, ZA-6035 Port Elizabeth, South Africa
关键词
CSIRT; CERT; computer security incident response; security operations centre; NREN; research and education network; South Africa; business requirements; INFORMATION-SYSTEMS RESEARCH; DESIGN SCIENCE;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The South African (SA) National Research and Education Network (NREN) identified the requirement for a Computer Security Incident Response Team (CSIRT). This paper sets the context for the CSIRT by exploring the business requirements and associated decisions in five areas: the environment, constituency, authority, funding and legal considerations. The SA NREN CSIRT was categorised as an academic sector CSIRT serving the research and education community of South Africa with limited authority. The NREN is comprised of two organisations and the corresponding embedded, but distributed, organisational model makes this CSIRT case particularly interesting. Various cost recovery options and relevant South African laws and regulations were also identified. The resulting "strategic" framework sets the scene for the remainder of the establishment process. This paper is useful to anyone desiring to establish a CSIRT, or equivalent capability, who can follow a similar process to discover where to begin.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [2] Computer Security Incident Response Team Effectiveness: A Needs Assessment
    Van der Kleij, Rick
    Kleinhuis, Geert
    Young, Heather
    FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [3] Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus
    Villegas-Ch, William
    Ortiz-Garces, Ivan
    Sanchez-Viteri, Santiago
    COMPUTERS, 2021, 10 (08)
  • [4] On Computer Security Incident Response Teams
    Horne, Bill
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 13 - 15
  • [5] Forming a critical incident response team in a maximum security setting
    Guariglia, MJ
    Smith, H
    FEDERAL PROBATION, 1995, 59 (02) : 40 - &
  • [6] Testing your computer security incident response plan
    Markey, Steve
    ISACA Journal, 2012, 2
  • [7] Prerequisites for building a computer security incident response capability
    Mooi, Roderick
    Botha, Reinhardt A.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [8] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870
  • [9] A MANAGEMENT MODEL FOR BUILDING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY
    Mooi, Roderick D.
    Botha, Reinhardt A.
    SAIEE AFRICA RESEARCH JOURNAL, 2016, 107 (02): : 78 - 91
  • [10] Methodology for Computer Security Incident Response Teams into IoT Strategy
    Enciso Bernal, Alejandro
    Martinez Monterrubio, Sergio Mauricio
    Parra Puente, Javier
    Gonzalez Crespo, Ruben
    Verdu, Elena
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (05): : 1909 - 1928