메뉴 건너뛰기




Volumn 8, Issue 2, 2003, Pages 55-64

Management strategies for implementing forensic security measures

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER NETWORKS; COMPUTER SYSTEM RECOVERY; INFORMATION MANAGEMENT; LAW ENFORCEMENT; LAWS AND LEGISLATION; PUBLIC POLICY; SOCIETIES AND INSTITUTIONS;

EID: 1942505732     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1363-4127(03)00207-3     Document Type: Note
Times cited : (18)

References (8)
  • 1
    • 1942457461 scopus 로고    scopus 로고
    • Francis Bacon (1561-1626) in a letter to the Earl of Essex 1598
    • Francis Bacon (1561-1626) in a letter to the Earl of Essex 1598.
  • 2
    • 1942457462 scopus 로고    scopus 로고
    • (Computer Security Institute/Federal Bureau of Investigation) the number of internal and external incidents over the past five years is approximately equal, see page 7 of the Survey. The 2003 Survey can be obtained from
    • CSI/FBI Annual Security Survey 2003 - (Computer Security Institute/Federal Bureau of Investigation) the number of internal and external incidents over the past five years is approximately equal, see page 7 of the Survey. The 2003 Survey can be obtained from: www.gocsi.com/press/20020407. jhtml;jsessionid=LY1UTACFKM3BCQSNDBCSKHSCJUMEIJVN?_requestid=87673.
    • CSI/FBI Annual Security Survey 2003
  • 3
    • 0003692134 scopus 로고    scopus 로고
    • Sources of standards - ISO/IEC 17799:2001 Information Technology. Other risk management standards may be found at: SANS (SysAdmin, Audit, Network, Security Institute, www.sans.org) and NIST (National Institute of Science and Technology), www.nist.gov
    • Sources of standards - ISO/IEC 17799:2001 Information Technology - Code of Practice for Information Security Management ( http://csrc.nist.gov/ publications ). Other risk management standards may be found at: SANS (SysAdmin, Audit, Network, Security Institute, www.sans.org ) and NIST (National Institute of Science and Technology, www.nist.gov ).
    • Code of Practice for Information Security Management
  • 4
    • 1942457464 scopus 로고    scopus 로고
    • FTC settles with Guess on Web vulnerabilities
    • 19 June
    • FTC settles with Guess on Web vulnerabilities, Computerworld 19 June 2003, www.computerworld.com .
    • (2003) Computerworld
  • 7
    • 1942457463 scopus 로고    scopus 로고
    • Computer Emergency Response Team located at Carnegie-Mellon University, Pittsburgh, Pennsylvania, There are several such organizations around the world- for example: Janet-CERT, DoD-CERT, AusCERT, DFN-CERT.A definitive list may be found at www.first.org/team-info
    • CERT - Computer Emergency Response Team located at Carnegie-Mellon University, Pittsburgh, Pennsylvania, www.cert.org . There are several such organizations around the world- for example: Janet-CERT, DoD-CERT, AusCERT, DFN-CERT.A definitive list may be found at www.first.org/team-info.
  • 8
    • 1942425705 scopus 로고    scopus 로고
    • FIRST - Forum of Incident Response and Security Teams. This can be found on the Internet at www.first.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.