메뉴 건너뛰기




Volumn , Issue , 2014, Pages 27-46

Information security incident management: Identified practice in large organizations

Author keywords

Best practices; Incident management; Information security

Indexed keywords

INFORMATION DISSEMINATION; SECURITY SYSTEMS; SOCIETIES AND INSTITUTIONS;

EID: 84903700846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMF.2014.9     Document Type: Conference Paper
Times cited : (40)

References (24)
  • 4
    • 84876369615 scopus 로고    scopus 로고
    • European Network Information Security Agency (ENISA)
    • European Network and Information Security Agency (ENISA), "Good Practice Guide for Incident Management," 2010
    • (2010) Good Practice Guide for Incident Management
  • 8
    • 84903696261 scopus 로고    scopus 로고
    • Security Incident handling and reporting: A study of the difference between theory and practice
    • T. L. Orderl?ken, "Security Incident handling and reporting: A study of the difference between theory and practice," Gj?ik University College, 2005
    • (2005) Gjoøik University College
    • Orderloøkken, T.L.1
  • 10
    • 48249133620 scopus 로고    scopus 로고
    • A study of information security practice in a critical infrastructure application
    • ser. Lecture Notes in Computer Science, C. Rong, M. G. Jaatun, F. E. Sandnes, L. T. Yang, and J. Ma, Eds Springer Berlin Heidelberg
    • M. G. Jaatun, E. Albrechtsen, M. Line, S. O. Johnsen, I. Waeroø O. H. Longva, and I. A. Toøndel, "A study of information security practice in a critical infrastructure application," in Autonomic and Trusted Computing, ser. Lecture Notes in Computer Science, C. Rong, M. G. Jaatun, F. E. Sandnes, L. T. Yang, and J. Ma, Eds. Springer Berlin Heidelberg, 2008, vol. 5060, pp. 527-539 [Online]. Available:
    • (2008) Autonomic and Trusted Computing , vol.5060 , pp. 527-539
    • Jaatun, M.G.1    Albrechtsen, E.2    Line, M.3    Johnsen, S.O.4    Waeroø, I.5    Longva, O.H.6    Toøndel, I.A.7
  • 11
    • 77957923047 scopus 로고    scopus 로고
    • Creating an itil inspired incident management approach: Roots, response, and results
    • IEEE/IFIP
    • J. Cusick and G. Ma, "Creating an itil inspired incident management approach: Roots, response, and results," in Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP, 2010, pp. 142-148
    • (2010) Network Operations and Management Symposium Workshops (NOMS Wksps) , vol.2010 , pp. 142-148
    • Cusick, J.1    Ma, G.2
  • 12
    • 77949522891 scopus 로고    scopus 로고
    • Preparation, detection, and analysis: The diagnostic work of IT security incident response
    • R. Werlinger, K. Muldner, K. Hawkey, and K. Beznosov, "Preparation, detection, and analysis: the diagnostic work of IT security incident response," Information Management &Computer Security, vol. 18, no. 1, pp. 26-42, 2010
    • (2010) Information Management &Computer Security , vol.18 , Issue.1 , pp. 26-42
    • Werlinger, R.1    Muldner, K.2    Hawkey, K.3    Beznosov, K.4
  • 13
    • 84862303039 scopus 로고    scopus 로고
    • Incident response teams-Challenges in supporting the organisational security function
    • A. Ahmad, J. Hadgkiss, and A. Ruighaver, "Incident response teams-Challenges in supporting the organisational security function," Computers &Security, 2012
    • (2012) Computers &Security
    • Ahmad, A.1    Hadgkiss, J.2    Ruighaver, A.3
  • 14
    • 67650152666 scopus 로고    scopus 로고
    • Protection motivation and deterrence: A framework for security policy compliance in organisations
    • Apr
    • T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organisations," Eur J Inf Syst, vol. 18, no. 2, pp. 106-125, Apr 2009 [Online]. Available: http://dx.doi.org/ 10.1057/ejis.2009.6
    • (2009) Eur J Inf Syst , vol.18 , Issue.2 , pp. 106-125
    • Herath, T.1    Rao, H.R.2
  • 15
    • 78650100295 scopus 로고    scopus 로고
    • Towards incident handling in the cloud: Challenges and approaches
    • ser. CCSW '10. New York, NY, USA: ACM
    • B. Grobauer and T. Schreck, "Towards incident handling in the cloud: Challenges and approaches," in Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '10. New York, NY, USA: ACM, 2010, pp. 77-86 [Online]. Available: http://doi.acm.org/10.1145/1866835.1866850
    • (2010) Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop , pp. 77-86
    • Grobauer, B.1    Schreck, T.2
  • 18
    • 0003673547 scopus 로고    scopus 로고
    • 4th ed., ser. Applied Social Research Method Series SAGE Publications
    • R. K. Yin, Case Study Research Design and Methods, 4th ed., ser. Applied Social Research Method Series. SAGE Publications, 2009, vol. 5
    • (2009) Case Study Research Design and Methods , vol.5
    • Yin, R.K.1
  • 20
    • 33846313618 scopus 로고    scopus 로고
    • The qualitative interview in IS research: Examining the craft
    • M. D. Myers and M. Newman, "The qualitative interview in IS research: Examining the craft," Information and organization, vol. 17, no. 1, pp. 2-26, 2007
    • (2007) Information and Organization , vol.17 , Issue.1 , pp. 2-26
    • Myers, M.D.1    Newman, M.2
  • 22
    • 34548184227 scopus 로고    scopus 로고
    • A general inductive approach for analyzing qualitative evaluation data
    • D. R. Thomas, "A General Inductive Approach for Analyzing Qualitative Evaluation Data," American Journal of Evaluation, vol. 27, no. 2, pp. 237-246, 2006
    • (2006) American Journal of Evaluation , vol.27 , Issue.2 , pp. 237-246
    • Thomas, D.R.1
  • 23
    • 84888884622 scopus 로고    scopus 로고
    • CISOs and organisational culture: Their own worst enemy?
    • D. Ashenden and A. Sasse, "CISOs and organisational culture: Their own worst enemy?" Computers &Security, vol. 39, pp. 396-405, 2013
    • (2013) Computers &Security , vol.39 , pp. 396-405
    • Ashenden, D.1    Sasse, A.2
  • 24
    • 84897419985 scopus 로고    scopus 로고
    • Working to rule, or working safely? Part 1: A state of the art review
    • A. Hale and D. Borys, "Working to rule, or working safely? Part 1: A state of the art review," Safety Science, 2012 [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0925753512001312
    • (2012) Safety Science
    • Hale, A.1    Borys, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.