메뉴 건너뛰기




Volumn 45, Issue , 2014, Pages 42-57

Information security incident management: Current practice as reported in the literature

Author keywords

Incident management; Incident response; Information security; ISO IEC 27035; Systematic review

Indexed keywords

ISO STANDARDS; SECURITY OF DATA;

EID: 84902687316     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.05.003     Document Type: Article
Times cited : (75)

References (31)
  • 1
    • 84862303039 scopus 로고    scopus 로고
    • Incident response teams - Challenges in supporting the organisational security function
    • A. Ahmad, J. Hadgkiss, and A.B. Ruighaver Incident response teams - challenges in supporting the organisational security function Comput Secur 31 5 2012 643 652
    • (2012) Comput Secur , vol.31 , Issue.5 , pp. 643-652
    • Ahmad, A.1    Hadgkiss, J.2    Ruighaver, A.B.3
  • 5
    • 84864002621 scopus 로고    scopus 로고
    • Information technology incident management: A case study of the University of Oviedo and the Faculty of Teacher Training and Education
    • J.F. Cadavieco, C.R. Pérez, and C.B. Fernández Information technology incident management: a case study of the University of Oviedo and the Faculty of Teacher Training and Education Univ Knowl Soc J (RUSC) 9 2 2012 280 295
    • (2012) Univ Knowl Soc J (RUSC) , vol.9 , Issue.2 , pp. 280-295
    • Cadavieco, J.F.1    Pérez, C.R.2    Fernández, C.B.3
  • 10
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • 10.1057/ejis.2009.6
    • T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations Eur J Inf Syst 18 2 2009 106 125 10.1057/ejis.2009.6
    • (2009) Eur J Inf Syst , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 12
    • 81755176763 scopus 로고    scopus 로고
    • New method of forensic computing in a small organization
    • S. Ismail, A. Ahmad, and M.A.M. Shukran New method of forensic computing in a small organization Aust J Basic Appl Sci 5 9 2011 2019 2025
    • (2011) Aust J Basic Appl Sci , vol.5 , Issue.9 , pp. 2019-2025
    • Ismail, S.1    Ahmad, A.2    Shukran, M.A.M.3
  • 14
    • 48249133620 scopus 로고    scopus 로고
    • A study of information security practice in a critical infrastructure application
    • C. Rong, M.G. Jaatun, F.E. Sandnes, L.T. Yang, J. Ma, Lecture Notes in Computer Science Springer Berlin Heidelberg 10.1007/978-3-540-69295-9-42
    • M.G. Jaatun, E. Albrechtsen, M. Line, S.O. Johnsen, I. Wærø, and O.H. Longva et al. A study of information security practice in a critical infrastructure application C. Rong, M.G. Jaatun, F.E. Sandnes, L.T. Yang, J. Ma, Autonomic and Trusted Computing Lecture Notes in Computer Science vol. 5060 2008 Springer Berlin Heidelberg 527 539 10.1007/978-3-540-69295-9-42
    • (2008) Autonomic and Trusted Computing , vol.5060 VOL. , pp. 527-539
    • Jaatun, M.G.1    Albrechtsen, E.2    Line, M.3    Johnsen, S.O.4    Wærø, I.5    Longva, O.H.6
  • 16
    • 33750386836 scopus 로고    scopus 로고
    • Network intrusion investigation - Preparation and challenges
    • DOI 10.1016/j.diin.2006.08.001, PII S1742287606000922
    • A. Johnston, and J. Reust Network intrusion investigation preparation and challenges Digit Investig 3 3 2006 118 126 10.1016/j.diin.2006.08.001 http://www.sciencedirect.com/science/article/pii/S1742287606000922 (Pubitemid 44642357)
    • (2006) Digital Investigation , vol.3 , Issue.3 , pp. 118-126
    • Johnston, A.1    Reust, J.2
  • 19
    • 1242263532 scopus 로고    scopus 로고
    • Why there aren't more information security research studies
    • 10.1016/j.im.2003.08.001
    • A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Inf Manag 41 5 2004 597 607 10.1016/j.im.2003.08.001 http://www.sciencedirect.com/science/article/pii/S0378720603000995
    • (2004) Inf Manag , vol.41 , Issue.5 , pp. 597-607
    • Kotulic, A.G.1    Clark, J.G.2
  • 22
    • 84883337853 scopus 로고    scopus 로고
    • A case study: Preparing for the smart grids - Identifying current practice for information security incident management in the power industry
    • M.B. Line A case study: preparing for the smart grids - identifying current practice for information security incident management in the power industry Seventh International Conference on IT Security Incident Management and IT Forensics (IMF) 2013
    • (2013) Seventh International Conference on IT Security Incident Management and IT Forensics (IMF)
    • Line, M.B.1
  • 24
    • 34748857961 scopus 로고    scopus 로고
    • Setting up a GRID-CERT, Experiences of an academic CSIRT
    • K. Möller Setting up a GRID-CERT, Experiences of an academic CSIRT Campus Wide Inf Syst 24 4 2007 260 270
    • (2007) Campus Wide Inf Syst , vol.24 , Issue.4 , pp. 260-270
    • Möller, K.1
  • 25
    • 84857359642 scopus 로고    scopus 로고
    • Unrealistic optimism on information security management
    • 10.1016/j.cose.2011.12.001
    • H.S. Rhee, Y.U. Ryu, and C.T. Kim Unrealistic optimism on information security management Comput Secur 31 2 2012 221 232 10.1016/j.cose.2011.12.001 http://www.sciencedirect.com/science/article/pii/S0167404811001441
    • (2012) Comput Secur , vol.31 , Issue.2 , pp. 221-232
    • Rhee, H.S.1    Ryu, Y.U.2    Kim, C.T.3
  • 27
    • 84902674022 scopus 로고    scopus 로고
    • Proactive incident response
    • F. Scholl, and M. Mangold Proactive incident response Inf Syst Secur Assoc J 9 2 2011 http://www.issa.org/?page=JournalFebruary2011
    • (2011) Inf Syst Secur Assoc J , vol.9 , Issue.2
    • Scholl, F.1    Mangold, M.2
  • 29
    • 77949522891 scopus 로고    scopus 로고
    • Preparation, detection, and analysis: The diagnostic work of IT security incident response
    • R. Werlinger, K. Muldner, K. Hawkey, and K. Beznosov Preparation, detection, and analysis: the diagnostic work of IT security incident response Inf Manag Comput Secur 18 1 2010 26 42
    • (2010) Inf Manag Comput Secur , vol.18 , Issue.1 , pp. 26-42
    • Werlinger, R.1    Muldner, K.2    Hawkey, K.3    Beznosov, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.