Information security incident management: Current practice as reported in the literature
Tài liệu tham khảo
Ahmad, 2012, Incident response teams – challenges in supporting the organisational security function, Comput Secur, 31, 643, 10.1016/j.cose.2012.04.001
Anderson, 2012, Measuring the cost of cybercrime
Barrett, 2004, Field studies of computer system administrators: analysis of system management tools and practices, 388
Brewster, 2012
Cadavieco, 2012, Information technology incident management: a case study of the University of Oviedo and the Faculty of Teacher Training and Education, Univ Knowl Soc J (RUSC), 9, 280
Cichonski, 2008
Cusick, 2010, Creating an ITIL inspired incident management approach: roots, response, and results, 142
de Souza, 2011, Information needs of system administrators in information technology service factories, 10
ENISA, 2010
Herath, 2009, Protection motivation and deterrence: a framework for security policy compliance in organisations, Eur J Inf Syst, 18, 106, 10.1057/ejis.2009.6
Hove, 2013
Ismail, 2011, New method of forensic computing in a small organization, Aust J Basic Appl Sci, 5, 2019
2011
Jaatun, 2008, A study of information security practice in a critical infrastructure application, vol. 5060, 527
Jaatun, 2009, A framework for incident response management in the petroleum industry, Int J Crit Infrastruct Prot, 2, 26, 10.1016/j.ijcip.2009.02.004
Johnston, 2006, Network intrusion investigation preparation and challenges, Digit Investig, 3, 118, 10.1016/j.diin.2006.08.001
Kitchenham, 2007
Koivunen, 2010, Why wasn't I notified: information security incident reporting demystified
Kotulic, 2004, Why there aren't more information security research studies, Inf Manag, 41, 597, 10.1016/j.im.2003.08.001
Kral, 2011
Kurowski, 2011, Computational documentation of IT incidents as support for forensic operations, 37
Line, 2013, A case study: preparing for the smart grids – identifying current practice for information security incident management in the power industry
Metzger, 2011, Integrated security incident management – concepts and real-world experiences, 107
Möller, 2007, Setting up a GRID-CERT, Experiences of an academic CSIRT, Campus Wide Inf Syst, 24, 260, 10.1108/10650740710834644
Rhee, 2012, Unrealistic optimism on information security management, Comput Secur, 31, 221, 10.1016/j.cose.2011.12.001
Robson, 2011
Scholl, 2011, Proactive incident response, Inf Syst Secur Assoc J, 9
Werlinger, 2008, The challenges of using an intrusion detection system: is it worth the effort?, 107
Werlinger, 2010, Preparation, detection, and analysis: the diagnostic work of IT security incident response, Inf Manag Comput Secur, 18, 26, 10.1108/09685221011035241
West-Brown, 2003
Wilson, 2008