메뉴 건너뛰기




Volumn 49, Issue , 2015, Pages 45-69

A survey of information security incident handling in the cloud

Author keywords

Capability Maturity Model For Services (CMMI SVC); Cloud computing; Cloud response; Incident handling; Incident management; Incident response

Indexed keywords

CLOUD COMPUTING; COMPUTER CRIME; DIGITAL LIBRARIES; ELECTRONIC CRIME COUNTERMEASURES; SECURITY OF DATA; SOFTWARE ENGINEERING; SURVEYS;

EID: 84916918767     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2014.11.006     Document Type: Review
Times cited : (153)

References (214)
  • 4
    • 84862303039 scopus 로고    scopus 로고
    • Incident response teams - Challenges in supporting the organisational security function
    • A. Ahmad, J. Hadgkiss, and A.B. Ruighaver Incident response teams - challenges in supporting the organisational security function Comput Secur 31 5 2012 643 652
    • (2012) Comput Secur , vol.31 , Issue.5 , pp. 643-652
    • Ahmad, A.1    Hadgkiss, J.2    Ruighaver, A.B.3
  • 5
    • 84864628454 scopus 로고    scopus 로고
    • Forensic analysis of social networking applications on mobile devices
    • N. Al Mutawa, I. Baggili, and A. Marrington Forensic analysis of social networking applications on mobile devices Digit Investig 9 2012 2012 24 33
    • (2012) Digit Investig , vol.9 , Issue.2012 , pp. 24-33
    • Al Mutawa, N.1    Baggili, I.2    Marrington, A.3
  • 6
    • 84867827770 scopus 로고    scopus 로고
    • Effective digital forensic analysis of the NTFS disk image
    • M. Alazab, S. Venkatraman, and P. Watters Effective digital forensic analysis of the NTFS disk image Ubiquitous Comput Commun J 4 3 2009 551 558
    • (2009) Ubiquitous Comput Commun J , vol.4 , Issue.3 , pp. 551-558
    • Alazab, M.1    Venkatraman, S.2    Watters, P.3
  • 7
    • 84910613242 scopus 로고    scopus 로고
    • Security risk assessment framework for cloud computing environments
    • S.H. Albakri, B. Shanmugam, G.N. Samy, N.B. Idris, and A. Ahmed Security risk assessment framework for cloud computing environments Secur Commun Netw 7 11 2014 2114 2124
    • (2014) Secur Commun Netw , vol.7 , Issue.11 , pp. 2114-2124
    • Albakri, S.H.1    Shanmugam, B.2    Samy, G.N.3    Idris, N.B.4    Ahmed, A.5
  • 9
    • 84871979421 scopus 로고    scopus 로고
    • Let me in the cloud: Analysis of the benefit and risk assessment of cloud platform
    • A. Aleem, and C.R. Sprott Let me in the cloud: analysis of the benefit and risk assessment of cloud platform J Financ Crime 20 1 2013 6 24
    • (2013) J Financ Crime , vol.20 , Issue.1 , pp. 6-24
    • Aleem, A.1    Sprott, C.R.2
  • 14
    • 84910663668 scopus 로고    scopus 로고
    • A response selection model for intrusion response systems: Response strategy model (RSM)
    • N.B. Anuar, M. Papadaki, S. Furnell, and N. Clarke A response selection model for intrusion response systems: response strategy model (RSM) Secur Commun Netw 7 11 November 2014 1831 1848
    • (2014) Secur Commun Netw , vol.7 , Issue.11 , pp. 1831-1848
    • Anuar, N.B.1    Papadaki, M.2    Furnell, S.3    Clarke, N.4
  • 18
    • 84886465116 scopus 로고    scopus 로고
    • Data recovery from proprietary-formatted CCTV hard disks
    • Springer Berlin Heidelberg
    • A. Ariffin, J. Slay, and K. Choo Data recovery from proprietary-formatted CCTV hard disks Advances in digital forensics IX 2013 Springer Berlin Heidelberg 213 223
    • (2013) Advances in Digital Forensics IX , pp. 213-223
    • Ariffin, A.1    Slay, J.2    Choo, K.3
  • 20
    • 84887997261 scopus 로고    scopus 로고
    • Damaged backup data recovery method for Windows mobile
    • J. Bang, C. Lee, S. Lee, and K. Lee Damaged backup data recovery method for Windows mobile J Supercomput 66 2 2013 875 887
    • (2013) J Supercomput , vol.66 , Issue.2 , pp. 875-887
    • Bang, J.1    Lee, C.2    Lee, S.3    Lee, K.4
  • 23
    • 84890025885 scopus 로고    scopus 로고
    • Incident-centered information security: Managing a strategic balance between prevention and response
    • R. Baskerville, P. Spagnoletti, and J. Kim Incident-centered information security: managing a strategic balance between prevention and response Inf Manag 51 1 2014 138 151
    • (2014) Inf Manag , vol.51 , Issue.1 , pp. 138-151
    • Baskerville, R.1    Spagnoletti, P.2    Kim, J.3
  • 24
    • 84905868721 scopus 로고    scopus 로고
    • European cyber security policy
    • German Institute for International and Security Affairs Berlin
    • A. Bendiek European cyber security policy SWP research paper 13 2012 German Institute for International and Security Affairs Berlin
    • (2012) SWP Research Paper 13
    • Bendiek, A.1
  • 25
    • 84916931925 scopus 로고    scopus 로고
    • An architecture for a distributed collaborative inter university incident handling mechanism
    • D.S. Bhilare, A.K. Ramani, and S. Tanwani An architecture for a distributed collaborative inter university incident handling mechanism Int J Comput Internet Secur 2 1 2010 29 39
    • (2010) Int J Comput Internet Secur , vol.2 , Issue.1 , pp. 29-39
    • Bhilare, D.S.1    Ramani, A.K.2    Tanwani, S.3
  • 26
    • 84880563297 scopus 로고    scopus 로고
    • A quantitative model for information-security risk management
    • R. Bojanc A quantitative model for information-security risk management Eng Manag J 25 2 2013 25 37
    • (2013) Eng Manag J , vol.25 , Issue.2 , pp. 25-37
    • Bojanc, R.1
  • 28
    • 84902422187 scopus 로고    scopus 로고
    • IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective
    • A. Butler, and K. Choo IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: an Australian perspective Secur J 2013 1 20
    • (2013) Secur J , pp. 1-20
    • Butler, A.1    Choo, K.2
  • 30
    • 84879206703 scopus 로고    scopus 로고
    • Analytical models for risk-based intrusion response
    • B. Caskurlu, A. Gehani, C.C. Bilgin, and K. Subramani Analytical models for risk-based intrusion response Comput Netw 57 10 2013 2181 2192
    • (2013) Comput Netw , vol.57 , Issue.10 , pp. 2181-2192
    • Caskurlu, B.1    Gehani, A.2    Bilgin, C.C.3    Subramani, K.4
  • 31
    • 70349596824 scopus 로고    scopus 로고
    • Risk profiles and distributed risk assessment
    • H. Chivers, J.A. Clark, and P.-C. Cheng Risk profiles and distributed risk assessment Comput Secur 28 7 2009 521 535
    • (2009) Comput Secur , vol.28 , Issue.7 , pp. 521-535
    • Chivers, H.1    Clark, J.A.2    Cheng, P.-C.3
  • 32
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: Challenges and future research directions
    • K.-K.R. Choo The cyber threat landscape: challenges and future research directions Comput Secur 30 8 2011 719 731
    • (2011) Comput Secur , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 33
    • 84916904380 scopus 로고    scopus 로고
    • A cloud security risk-management strategy
    • K.-K.R. Choo A cloud security risk-management strategy IEEE Cloud Comput 1 2 2014 52 56
    • (2014) IEEE Cloud Comput , vol.1 , Issue.2 , pp. 52-56
    • Choo, K.-K.R.1
  • 34
    • 84905834871 scopus 로고    scopus 로고
    • A conceptual interdisciplinary plug-and-play cyber security framework
    • H. Kaur, X. Tao, Springer New York, USA
    • K.-K.R. Choo A conceptual interdisciplinary plug-and-play cyber security framework H. Kaur, X. Tao, ICTs and the millennium development goals - a United Nations perspective 2014 Springer New York, USA 81 99
    • (2014) ICTs and the Millennium Development Goals - A United Nations Perspective , pp. 81-99
    • Choo, K.-K.R.1
  • 36
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • H. Chung, J. Park, S. Lee, and C. Kang Digital forensic investigation of cloud storage services Digit Investig 9 2 2012 81 95
    • (2012) Digit Investig , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 40
    • 74349085393 scopus 로고    scopus 로고
    • Cmmi Product Team Version 1.3 CMU/SEI Pittsburgh
    • ® for services Version 1.3 2010 CMU/SEI Pittsburgh
    • (2010) ® for Services
  • 41
    • 78651087972 scopus 로고    scopus 로고
    • Toward a science of digital forensic evidence examination
    • Springer Berlin Heidelberg
    • F. Cohen Toward a science of digital forensic evidence examination Advances in digital forensics VI 2009 Springer Berlin Heidelberg 17 35
    • (2009) Advances in Digital Forensics VI , pp. 17-35
    • Cohen, F.1
  • 49
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-As-A-Service cloud computing: Exploring and evaluating tools, trust, and techniques
    • J. Dykstra, and A.T. Sherman Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques Digit Investig 9 2012 90 98
    • (2012) Digit Investig , vol.9 , pp. 90-98
    • Dykstra, J.1    Sherman, A.T.2
  • 51
    • 84900844255 scopus 로고    scopus 로고
    • Towards a systematic framework for digital forensic readiness
    • M. Elyas, S.B. Maynard, A. Ahmad, and A. Lonie Towards a systematic framework for digital forensic readiness J Comput Inf Syst 54 3 2014 97 106
    • (2014) J Comput Inf Syst , vol.54 , Issue.3 , pp. 97-106
    • Elyas, M.1    Maynard, S.B.2    Ahmad, A.3    Lonie, A.4
  • 52
    • 84876369615 scopus 로고    scopus 로고
    • European Network And Information Security Agency (enisa) ENISA Athens
    • European Network and Information Security Agency (ENISA) Good practice guide for incident management 2010 ENISA Athens
    • (2010) Good Practice Guide for Incident Management
  • 53
    • 84873848974 scopus 로고    scopus 로고
    • European Network And Information Security Agency (enisa) ENISA Athens
    • European Network and Information Security Agency (ENISA) National cyber security strategies 2012 ENISA Athens
    • (2012) National Cyber Security Strategies
  • 54
    • 84899507710 scopus 로고    scopus 로고
    • BitTorrent Sync: First impressions and digital forensic implications
    • J. Farina, M. Scanlon, and M.-T. Kechadi BitTorrent Sync: first impressions and digital forensic implications Digit Investig 11 2014 2014 77 86
    • (2014) Digit Investig , vol.11 , Issue.2014 , pp. 77-86
    • Farina, J.1    Scanlon, M.2    Kechadi, M.-T.3
  • 56
    • 84898541002 scopus 로고    scopus 로고
    • A multi-attribute decision model for intrusion response system
    • B.A. Fessi, S. Benabdallah, N. Boudriga, and M. Hamdi A multi-attribute decision model for intrusion response system Inf Sci 270 2014 2014 237 254
    • (2014) Inf Sci , vol.270 , Issue.2014 , pp. 237-254
    • Fessi, B.A.1    Benabdallah, S.2    Boudriga, N.3    Hamdi, M.4
  • 59
    • 84864616626 scopus 로고    scopus 로고
    • A general strategy for differential forensic analysis
    • S. Garfinkel, A.J. Nelson, and J. Young A general strategy for differential forensic analysis Digit Investig 9 2012 2012 50 59
    • (2012) Digit Investig , vol.9 , Issue.2012 , pp. 50-59
    • Garfinkel, S.1    Nelson, A.J.2    Young, J.3
  • 63
    • 84881284653 scopus 로고    scopus 로고
    • Android forensics: Automated data collection and reporting from a mobile device
    • J. Grover Android forensics: automated data collection and reporting from a mobile device Digit Investig 10 2013 2013 12 20
    • (2013) Digit Investig , vol.10 , Issue.2013 , pp. 12-20
    • Grover, J.1
  • 65
    • 84883970461 scopus 로고    scopus 로고
    • Cyber forensics and incident response
    • 2nd ed. Elsevier Inc.
    • C. Gurkok Cyber forensics and incident response Computer and information security handbook 2nd ed. 2013 Elsevier Inc. 601 622
    • (2013) Computer and Information Security Handbook , pp. 601-622
    • Gurkok, C.1
  • 67
    • 84899888782 scopus 로고    scopus 로고
    • Supporting case-based learning in information security with web-based technology
    • W. He, X. Yuan, L. Yang, and C. Science Supporting case-based learning in information security with web-based technology J Inf Syst Educ 24 1 2013 31 41
    • (2013) J Inf Syst Educ , vol.24 , Issue.1 , pp. 31-41
    • He, W.1    Yuan, X.2    Yang, L.3    Science, C.4
  • 68
    • 84901243192 scopus 로고    scopus 로고
    • An empirical study on the use of the generic security template for structuring the lessons from information security incidents
    • Y. He, C. Johnson, K. Renaud, Y. Lu, and S. Jebrieli An empirical study on the use of the generic security template for structuring the lessons from information security incidents 2014 6th International conference on CSIT 2014 178 188
    • (2014) 2014 6th International Conference on CSIT , pp. 178-188
    • He, Y.1    Johnson, C.2    Renaud, K.3    Lu, Y.4    Jebrieli, S.5
  • 70
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations
    • C. Hooper, B. Martini, and K.-K.R. Choo Cloud computing and its implications for cybercrime investigations Aust Comput Law Secur Rev 29 2 2013 152 163
    • (2013) Aust Comput Law Secur Rev , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 73
    • 84927606575 scopus 로고    scopus 로고
    • Personalized cloud storage system: A combination of LDAP distributed file system
    • Springer International Publishing
    • C.T. Hsu, G.H. Luo, and S.M. Yuan Personalized cloud storage system: a combination of LDAP distributed file system Genetic and evolutionary computing 2014 Springer International Publishing 399 408
    • (2014) Genetic and Evolutionary Computing , pp. 399-408
    • Hsu, C.T.1    Luo, G.H.2    Yuan, S.M.3
  • 74
    • 84885890014 scopus 로고    scopus 로고
    • IForensics: Forensic analysis of instant messaging on smart phones
    • Springer Berlin Heidelberg
    • M.I. Husain, and R. Sridhar iForensics: forensic analysis of instant messaging on smart phones Digital forensics and cyber crime 2010 Springer Berlin Heidelberg 9 18
    • (2010) Digital Forensics and Cyber Crime , pp. 9-18
    • Husain, M.I.1    Sridhar, R.2
  • 75
    • 84916940544 scopus 로고    scopus 로고
    • Enhanced timeline analysis for digital forensic investigations
    • B. Inglot, and L. Liu Enhanced timeline analysis for digital forensic investigations Inf Secur J A Glob Perspect 2014 1 13
    • (2014) Inf Secur J A Glob Perspect , pp. 1-13
    • Inglot, B.1    Liu, L.2
  • 77
    • 84958759277 scopus 로고    scopus 로고
    • Extracting evidence related to VoIP calls
    • Springer Berlin Heidelberg
    • D. Irwin, and J. Slay Extracting evidence related to VoIP calls Advances in digital forensics VII 2011 Springer Berlin Heidelberg 221 228
    • (2011) Advances in Digital Forensics VII , pp. 221-228
    • Irwin, D.1    Slay, J.2
  • 78
    • 81755176763 scopus 로고    scopus 로고
    • New method of forensic computing in a small organization
    • S. Ismail, A. Ahmad, M. Afizi, and M. Shukran New method of forensic computing in a small organization Aust J Basic Appl Sci 5 9 2011 2019 2025
    • (2011) Aust J Basic Appl Sci , vol.5 , Issue.9 , pp. 2019-2025
    • Ismail, S.1    Ahmad, A.2    Afizi, M.3    Shukran, M.4
  • 83
    • 84908259312 scopus 로고    scopus 로고
    • Android forensics: Interpretation of timestamps
    • M. Kaart, and S. Laraghy Android forensics: interpretation of timestamps Digit Investig 2014 1 15
    • (2014) Digit Investig , pp. 1-15
    • Kaart, M.1    Laraghy, S.2
  • 84
    • 70450188382 scopus 로고    scopus 로고
    • Adapting the ticket request system to the needs of CSIRT teams
    • P. Kácha Adapting the ticket request system to the needs of CSIRT teams WSEAS Trans Comput 8 9 2009 1440 1450
    • (2009) WSEAS Trans Comput , vol.8 , Issue.9 , pp. 1440-1450
    • Kácha, P.1
  • 86
    • 78049413993 scopus 로고    scopus 로고
    • A service dependency model for cost-sensitive intrusion response
    • Springer Berlin Heidelberg
    • N. Kheir, and N. Cuppens-Boulahia A service dependency model for cost-sensitive intrusion response Computer security-ESORICS 2010 2010 Springer Berlin Heidelberg 626 642
    • (2010) Computer Security-ESORICS 2010 , pp. 626-642
    • Kheir, N.1    Cuppens-Boulahia, N.2
  • 88
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • T. Khorshed, A.B.M.S. Ali, and S.A. Wasimi A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Future Gener Comput Syst 28 6 2012 833 851
    • (2012) Future Gener Comput Syst , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 92
  • 94
    • 84883559428 scopus 로고    scopus 로고
    • Integrated digital forensic process model
    • M.D. Kohn, M.M. Eloff, and J.H.P. Eloff Integrated digital forensic process model Comput Secur 38 2013 2013 103 115
    • (2013) Comput Secur , vol.38 , Issue.2013 , pp. 103-115
    • Kohn, M.D.1    Eloff, M.M.2    Eloff, J.H.P.3
  • 95
    • 84861591476 scopus 로고    scopus 로고
    • Why wasn't i notified?: Information security incident reporting demystified
    • Springer Berlin Heidelberg
    • E. Koivunen Why wasn't I notified?: information security incident reporting demystified Information security technology for application 2012 Springer Berlin Heidelberg 55 70
    • (2012) Information Security Technology for Application , pp. 55-70
    • Koivunen, E.1
  • 101
    • 84958523627 scopus 로고    scopus 로고
    • Game theoretic attack response framework for enterprise networks
    • Springer International Publishing
    • A. Kundu, and S.K. Ghosh Game theoretic attack response framework for enterprise networks Distributed computing and internet technology 2014 Springer International Publishing 263 274
    • (2014) Distributed Computing and Internet Technology , pp. 263-274
    • Kundu, A.1    Ghosh, S.K.2
  • 105
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok Toward cost-sensitive modeling for intrusion detection and response J Comput Secur 10 2 2002 5 22
    • (2002) J Comput Secur , vol.10 , Issue.2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 106
    • 84882236241 scopus 로고    scopus 로고
    • A deep understanding of cloud computing security issues in cloud computing
    • Springer Berlin Heidelberg
    • H. Li, X. Tian, W. Wei, and C. Sun A deep understanding of cloud computing security issues in cloud computing Network computing and information security 2012 Springer Berlin Heidelberg 98 105
    • (2012) Network Computing and Information Security , pp. 98-105
    • Li, H.1    Tian, X.2    Wei, W.3    Sun, C.4
  • 107
    • 84883337853 scopus 로고    scopus 로고
    • A case study: Preparing for the smart grids - Identifying current practice for information security incident management in the power industry
    • M.B. Line A case study: preparing for the smart grids - identifying current practice for information security incident management in the power industry 2013 Seventh international conference on IT security incident management and IT forensics 2013 26 32
    • (2013) 2013 Seventh International Conference on IT Security Incident Management and IT Forensics , pp. 26-32
    • Line, M.B.1
  • 108
    • 84889011520 scopus 로고    scopus 로고
    • A fictitious play-based response strategy for multistage intrusion defense systems
    • Y. Luo, F. Szidarovszky, Y. Al-Nashif, and S. Hariri A fictitious play-based response strategy for multistage intrusion defense systems Secur Commun Netw 2014 7 2014 473 491
    • (2014) Secur Commun Netw , vol.2014 , Issue.7 , pp. 473-491
    • Luo, Y.1    Szidarovszky, F.2    Al-Nashif, Y.3    Hariri, S.4
  • 109
    • 78649503588 scopus 로고    scopus 로고
    • Study on architecture-oriented information security risk assessment model
    • Springer Berlin Heidelberg
    • W.M. Ma Study on architecture-oriented information security risk assessment model Computational collective intelligence: technologies and applications 2010 Springer Berlin Heidelberg 218 226
    • (2010) Computational Collective Intelligence: Technologies and Applications , pp. 218-226
    • Ma, W.M.1
  • 111
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • B. Martini, and K.-K.R. Choo An integrated conceptual digital forensic framework for cloud computing Digit Investig 9 2 2012 71 80
    • (2012) Digit Investig , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 112
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: OwnCloud as a case study
    • B. Martini, and K.-K.R. Choo Cloud storage forensics: ownCloud as a case study Digit Investig 10 4 2013 1 13
    • (2013) Digit Investig , vol.10 , Issue.4 , pp. 1-13
    • Martini, B.1    Choo, K.-K.R.2
  • 113
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • B. Martini, and K.R. Choo Distributed filesystem forensics: XtreemFS as a case study Digit Investig 11 4 2014 295 313 http://dx.doi.org/10.1016/j.diin.2014.08.002
    • (2014) Digit Investig , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.R.2
  • 115
    • 33746748784 scopus 로고    scopus 로고
    • On incident handling and response: A state-Of-The-Art approach
    • S. Mitropoulos, D. Patsos, and C. Douligeris On incident handling and response: a state-of-the-art approach Comput Secur 25 5 2006 351 370
    • (2006) Comput Secur , vol.25 , Issue.5 , pp. 351-370
    • Mitropoulos, S.1    Patsos, D.2    Douligeris, C.3
  • 116
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of cloud computing
    • C. Modi, D. Patel, and B. Borisaniya A survey on security issues and solutions at different layers of cloud computing J Supercomput 63 2 2013 561 592
    • (2013) J Supercomput , vol.63 , Issue.2 , pp. 561-592
    • Modi, C.1    Patel, D.2    Borisaniya, B.3
  • 117
    • 84997032256 scopus 로고    scopus 로고
    • Handling compromised components in an IaaS cloud installation
    • A. Monfared, and M.G. Jaatun Handling compromised components in an IaaS cloud installation J Cloud Comput Adv Syst Appl 1 1 2012 1 21
    • (2012) J Cloud Comput Adv Syst Appl , vol.1 , Issue.1 , pp. 1-21
    • Monfared, A.1    Jaatun, M.G.2
  • 119
    • 84883552176 scopus 로고    scopus 로고
    • Hunting in the enterprise: Forensic triage and incident response
    • A. Moser, and M.I. Cohen Hunting in the enterprise: forensic triage and incident response Digit Investig 10 2 2013 89 98
    • (2013) Digit Investig , vol.10 , Issue.2 , pp. 89-98
    • Moser, A.1    Cohen, M.I.2
  • 120
    • 70449517238 scopus 로고    scopus 로고
    • An intrusion response decision-making model based on hierarchical task network planning
    • C. Mu, and Y. Li An intrusion response decision-making model based on hierarchical task network planning Expert Syst Appl 37 3 2010 2465 2472
    • (2010) Expert Syst Appl , vol.37 , Issue.3 , pp. 2465-2472
    • Mu, C.1    Li, Y.2
  • 122
  • 124
    • 78651068853 scopus 로고    scopus 로고
    • A forensic readiness model for wireless networks
    • Springer Berlin Heidelberg
    • S. Ngobeni, H. Venter, and I. Burke A forensic readiness model for wireless networks Advances in digital forensic VII 2010 Springer Berlin Heidelberg 107 117
    • (2010) Advances in Digital Forensic VII , pp. 107-117
    • Ngobeni, S.1    Venter, H.2    Burke, I.3
  • 125
    • 84866257721 scopus 로고    scopus 로고
    • The modelling of a digital forensic readiness approach for wireless local area networks
    • S. Ngobeni, H. Venter, and I. Burke The modelling of a digital forensic readiness approach for wireless local area networks J Univers Comput Sci 18 12 2012 1721 1740
    • (2012) J Univers Comput Sci , vol.18 , Issue.12 , pp. 1721-1740
    • Ngobeni, S.1    Venter, H.2    Burke, I.3
  • 126
    • 84916897340 scopus 로고    scopus 로고
    • Fostering incident response and digital forensics research
    • B.J. Nikkel Fostering incident response and digital forensics research Digit Investig 11 4 December 2014 249 251 http://dx.doi.org/10.1016/j.diin.2014.09.004
    • (2014) Digit Investig , vol.11 , Issue.4 , pp. 249-251
    • Nikkel, B.J.1
  • 128
    • 84894111873 scopus 로고    scopus 로고
    • Evaluating the privacy of Android mobile applications under forensic analysis
    • C. Ntantogian, D. Apostolopoulos, G. Marinakis, and C. Xenakis Evaluating the privacy of Android mobile applications under forensic analysis Comput Secur 42 2014 2014 66 76
    • (2014) Comput Secur , vol.42 , Issue.2014 , pp. 66-76
    • Ntantogian, C.1    Apostolopoulos, D.2    Marinakis, G.3    Xenakis, C.4
  • 129
    • 84890819785 scopus 로고    scopus 로고
    • Testing the harmonised digital forensic investigation process model-using an Android mobile phone
    • S. Omeleze, and H.S. Venter Testing the harmonised digital forensic investigation process model-using an Android mobile phone 2013 Information security for South Africa 2013 1 8
    • (2013) 2013 Information Security for South Africa , pp. 1-8
    • Omeleze, S.1    Venter, H.S.2
  • 131
    • 82455175178 scopus 로고    scopus 로고
    • An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines
    • P. Owen, and P. Thomas An analysis of digital forensic examinations: mobile devices versus hard disk drives utilising ACPO & NIST guidelines Digit Investig 8 2 2011 135 140
    • (2011) Digit Investig , vol.8 , Issue.2 , pp. 135-140
    • Owen, P.1    Thomas, P.2
  • 133
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: A systematic review
    • A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior An intrusion detection and prevention system in cloud computing: a systematic review J Netw Comput Appl 36 1 2013 25 41
    • (2013) J Netw Comput Appl , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Celestino Júnior, J.4
  • 134
    • 61349188280 scopus 로고    scopus 로고
    • Forensic analysis of the Firefox 3 internet history and recovery of deleted SQLite records
    • M.T. Pereira Forensic analysis of the Firefox 3 internet history and recovery of deleted SQLite records Digit Investig 5 3-4 2009 93 103
    • (2009) Digit Investig , vol.5 , Issue.34 , pp. 93-103
    • Pereira, M.T.1
  • 135
    • 79952493540 scopus 로고    scopus 로고
    • A generic framework for network forensics
    • E.S. Pilli, R.C. Joshi, and R. Niyogi A generic framework for network forensics Int J Comput Appl 1 11 2010 1 6
    • (2010) Int J Comput Appl , vol.1 , Issue.11 , pp. 1-6
    • Pilli, E.S.1    Joshi, R.C.2    Niyogi, R.3
  • 140
    • 84885718641 scopus 로고    scopus 로고
    • The development of warning, advice and reporting points (WARPs) in UK national infrastructure
    • Springer Berlin Heidelberg
    • T. Proctor The development of warning, advice and reporting points (WARPs) in UK national infrastructure Critical information infrastructure security 2013 Springer Berlin Heidelberg 164 174
    • (2013) Critical Information Infrastructure Security , pp. 164-174
    • Proctor, T.1
  • 141
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • D. Quick, and K.-K.R. Choo Digital droplets: Microsoft SkyDrive forensic data remnants Future Gener Comput Syst 29 6 2013 1378 1394
    • (2013) Future Gener Comput Syst , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 142
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • D. Quick, and K.-K.R. Choo Dropbox analysis: data remnants on user machines Digit Investig 10 1 2013 3 18
    • (2013) Digit Investig , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 143
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    • D. Quick, and K.-K.R. Choo Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit Investig 10 3 2013 266 277
    • (2013) Digit Investig , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 144
    • 84907215855 scopus 로고    scopus 로고
    • Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archive
    • D. Quick, and K.-K.R. Choo Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive Trends Issues Crime Crim Justice 480 2014 1 11
    • (2014) Trends Issues Crime Crim Justice , vol.480 , pp. 1-11
    • Quick, D.1    Choo, K.-K.R.2
  • 145
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: Forensic analysis of cloud storage data remnant
    • D. Quick, and K.-K.R. Choo Google drive: forensic analysis of cloud storage data remnant J Netw Comput Appl 40 2014 2014 179 193
    • (2014) J Netw Comput Appl , vol.40 , Issue.2014 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 146
    • 84916888408 scopus 로고    scopus 로고
    • Impacts of increasing volume of digital forensic data: A survey and future research challenges
    • D. Quick, and K.-K.R. Choo Impacts of increasing volume of digital forensic data: a survey and future research challenges Digit Investig 11 4 December 2014 273 294 http://dx.doi.org/10.1016/j.diin.2014.09.002
    • (2014) Digit Investig , vol.11 , Issue.4 , pp. 273-294
    • Quick, D.1    Choo, K.-K.R.2
  • 148
    • 84943538687 scopus 로고    scopus 로고
    • A forensic framework for handling information
    • Springer Berlin Heidelberg
    • K. Reddy, and H. Venter A forensic framework for handling information Advances in digital forensics V 2009 Springer Berlin Heidelberg 143 155
    • (2009) Advances in Digital Forensics v , pp. 143-155
    • Reddy, K.1    Venter, H.2
  • 149
    • 84874108116 scopus 로고    scopus 로고
    • Beyond lightning: A survey on security challenges in cloud computing
    • C. Rong, S.T. Nguyen, and M.G. Jaatun Beyond lightning: a survey on security challenges in cloud computing Comput Electr Eng 39 1 2013 47 54
    • (2013) Comput Electr Eng , vol.39 , Issue.1 , pp. 47-54
    • Rong, C.1    Nguyen, S.T.2    Jaatun, M.G.3
  • 153
    • 79953823011 scopus 로고    scopus 로고
    • Analysis of information security problem by probabilistic risk assessment
    • N. Satoh, and H. Kumamoto Analysis of information security problem by probabilistic risk assessment Int J Comput 3 3 2009 337 347
    • (2009) Int J Comput , vol.3 , Issue.3 , pp. 337-347
    • Satoh, N.1    Kumamoto, H.2
  • 154
    • 84971316752 scopus 로고    scopus 로고
    • ARITO: Cyber-attack response system using accurate risk impact tolerance
    • A. Shameli-Sendi, and M. Dagenais ARITO: cyber-attack response system using accurate risk impact tolerance Int J Inf Secur 2013 2013 1 24
    • (2013) Int J Inf Secur , Issue.2013 , pp. 1-24
    • Shameli-Sendi, A.1    Dagenais, M.2
  • 156
    • 84901267947 scopus 로고    scopus 로고
    • Taxonomy of intrusion risk assessment and response system
    • A. Shameli-Sendi, M. Cheriet, and A. Hamou-Lhadj Taxonomy of intrusion risk assessment and response system Comput Secur 45 2014 1 16
    • (2014) Comput Secur , vol.45 , pp. 1-16
    • Shameli-Sendi, A.1    Cheriet, M.2    Hamou-Lhadj, A.3
  • 157
    • 84864546078 scopus 로고    scopus 로고
    • Organisational learning and incident response: Promoting effective learning through the incident response process
    • P. Shedden, A. Ahmad, and A.B. Ruighaver Organisational learning and incident response: promoting effective learning through the incident response process Australian information security management conference 2010 131 142
    • (2010) Australian Information Security Management Conference , pp. 131-142
    • Shedden, P.1    Ahmad, A.2    Ruighaver, A.B.3
  • 159
    • 79955934365 scopus 로고    scopus 로고
    • Incorporating a knowledge perspective into security risk assessments
    • P. Shedden, R. Scheepers, W. Smith, and A. Ahmad Incorporating a knowledge perspective into security risk assessments VINE J Inf Knowl Manag Syst 41 2 2011 152 166
    • (2011) VINE J Inf Knowl Manag Syst , vol.41 , Issue.2 , pp. 152-166
    • Shedden, P.1    Scheepers, R.2    Smith, W.3    Ahmad, A.4
  • 160
    • 84864582590 scopus 로고    scopus 로고
    • A system for the proactive, continuous, and efficient collection of digital forensic evidence
    • C. Shields, O. Frieder, and M. Maloof A system for the proactive, continuous, and efficient collection of digital forensic evidence Digit Investig 8 2011 2011 3 13
    • (2011) Digit Investig , vol.8 , Issue.2011 , pp. 3-13
    • Shields, C.1    Frieder, O.2    Maloof, M.3
  • 161
    • 84916886217 scopus 로고    scopus 로고
    • Towards automated malware behavioral analysis and profiling for digital forensic investigation purposes
    • Springer Berlin Heidelberg
    • A.F. Shosha, J.I. James, A. Hannaway, C. Liu, P. Gladyshev, and A. Shosha Towards automated malware behavioral analysis and profiling for digital forensic investigation purposes Digital forensics and cyber crime 2013 Springer Berlin Heidelberg 66 80
    • (2013) Digital Forensics and Cyber Crime , pp. 66-80
    • Shosha, A.F.1    James, J.I.2    Hannaway, A.3    Liu, C.4    Gladyshev, P.5    Shosha, A.6
  • 163
    • 84878975464 scopus 로고    scopus 로고
    • 2012 An overview of disaster recovery in virtualization technology
    • R. Sindoori, P.V. Pallavi, and P. Abinaya 2012 An overview of disaster recovery in virtualization technology J Artif Intell 6 2013 2012 60 67
    • (2012) J Artif Intell , vol.6 , Issue.2013 , pp. 60-67
    • Sindoori, R.1    Pallavi, P.V.2    Abinaya, P.3
  • 164
    • 84885891514 scopus 로고    scopus 로고
    • The development of a generic framework for the forensic analysis of SCADA and process control systems
    • Springer Berlin Heidelberg
    • J. Slay, and E. Sitnikova The development of a generic framework for the forensic analysis of SCADA and process control systems Forensics in telecommunications, information and multimedia 2009 Springer Berlin Heidelberg 77 82
    • (2009) Forensics in Telecommunications, Information and Multimedia , pp. 77-82
    • Slay, J.1    Sitnikova, E.2
  • 167
    • 34548776459 scopus 로고    scopus 로고
    • A taxonomy of intrusion response systems
    • N. Stakhanova, S. Basu, and J. Wong A taxonomy of intrusion response systems Int J Inf Comput Secur 1 1/2 2007 169 184
    • (2007) Int J Inf Comput Secur , vol.1 , Issue.1-2 , pp. 169-184
    • Stakhanova, N.1    Basu, S.2    Wong, J.3
  • 170
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J Netw Comput Appl 34 1 2011 1 11
    • (2011) J Netw Comput Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 171
    • 84857917909 scopus 로고    scopus 로고
    • Acquisition and analysis of volatile memory from Android devices
    • J. Sylve, A. Case, L. Marziale, and G.G. Richard Acquisition and analysis of volatile memory from Android devices Digit Investig 8 3-4 2012 175 184
    • (2012) Digit Investig , vol.8 , Issue.34 , pp. 175-184
    • Sylve, J.1    Case, A.2    Marziale, L.3    Richard, G.G.4
  • 173
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • H. Takabi, B.J. James, and J.A. Gail Security and privacy challenges in cloud computing environments IEEE Secur Priv Mag 8 6 2010 24 31
    • (2010) IEEE Secur Priv Mag , vol.8 , Issue.6 , pp. 24-31
    • Takabi, H.1    James, B.J.2    Gail, J.A.3
  • 175
    • 84916880855 scopus 로고    scopus 로고
    • Developing an incident response plan
    • 2nd ed.
    • L.P. Taylor Developing an incident response plan FISMA compliance handbook 2nd ed. 2013 95 115
    • (2013) FISMA Compliance Handbook , pp. 95-115
    • Taylor, L.P.1
  • 176
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • M. Taylor, J. Haggerty, D. Gresty, and D. Lamb Forensic investigation of cloud computing systems Netw Secur 2011 3 2011 4 10
    • (2011) Netw Secur , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 177
    • 80052195504 scopus 로고    scopus 로고
    • Risk assessment methodology for interdependent critical infrastructures
    • M. Theoharidou, P. Kotzanikolaou, and D. Gritzalis Risk assessment methodology for interdependent critical infrastructures Int J Risk Assess Manag 15 2/3 2011 128 148
    • (2011) Int J Risk Assess Manag , vol.15 , Issue.2-3 , pp. 128-148
    • Theoharidou, M.1    Kotzanikolaou, P.2    Gritzalis, D.3
  • 180
    • 84902687316 scopus 로고    scopus 로고
    • Information security incident management: Current practice as reported in the literature
    • I.A. Tøndel, M.B. Line, and M.G. Jaatun Information security incident management: current practice as reported in the literature Comput Secur 45 2014 2014 42 57
    • (2014) Comput Secur , vol.45 , Issue.2014 , pp. 42-57
    • Tøndel, I.A.1    Line, M.B.2    Jaatun, M.G.3
  • 181
    • 78149296009 scopus 로고    scopus 로고
    • Advanced framework for digital forensic technologies and procedures
    • D. Trček, H. Abie, A. Skomedal, and I. Starc Advanced framework for digital forensic technologies and procedures J Forensic Sci 55 6 2010 1471 1480
    • (2010) J Forensic Sci , vol.55 , Issue.6 , pp. 1471-1480
    • Trček, D.1    Abie, H.2    Skomedal, A.3    Starc, I.4
  • 183
    • 84916904371 scopus 로고    scopus 로고
    • US District Court for the District of Columbia [viewed 18.06.14]
    • US District Court for the District of Columbia Morandum opinion: civil action no. 13-0851 (RJL) 2013 [viewed 18.06.14]
    • (2013) Morandum Opinion: Civil Action No. 13-0851 (RJL)
  • 186
    • 84856217239 scopus 로고    scopus 로고
    • Applying an ontology approach to IT service management for business-IT integration
    • M.-C. Valiente, E. Garcia-Barriocanal, and M.-A. Sicilia Applying an ontology approach to IT service management for business-IT integration Knowl Based Syst 28 2012 2012 76 87
    • (2012) Knowl Based Syst , vol.28 , Issue.2012 , pp. 76-87
    • Valiente, M.-C.1    Garcia-Barriocanal, E.2    Sicilia, M.-A.3
  • 187
    • 80053985064 scopus 로고    scopus 로고
    • Towards a digital forensic readiness framework for public key infrastructure systems
    • A. Valjarevic, and H.S. Venter Towards a digital forensic readiness framework for public key infrastructure systems 2011 Information security for South Africa 2011 1 10
    • (2011) 2011 Information Security for South Africa , pp. 1-10
    • Valjarevic, A.1    Venter, H.S.2
  • 188
    • 84886516285 scopus 로고    scopus 로고
    • A harmonized process model for digital forensic investigation
    • G. Peterson, S. Shenoi, Springer Berlin Heidelberg
    • A. Valjarevic, and H. Venter A harmonized process model for digital forensic investigation G. Peterson, S. Shenoi, Advances in digital forensic IX, IFIP AICT 2013 Springer Berlin Heidelberg 67 82
    • (2013) Advances in Digital Forensic IX, IFIP AICT , pp. 67-82
    • Valjarevic, A.1    Venter, H.2
  • 189
    • 84864618030 scopus 로고    scopus 로고
    • Toward a general collection methodology for Android devices
    • T. Vidas, C. Zhang, and N. Christin Toward a general collection methodology for Android devices Digit Investig 8 2011 2011 14 24
    • (2011) Digit Investig , vol.8 , Issue.2011 , pp. 14-24
    • Vidas, T.1    Zhang, C.2    Christin, N.3
  • 190
    • 84902248160 scopus 로고    scopus 로고
    • A situation awareness model for information security risk management
    • J. Webb, A. Ahmad, S.B. Maynard, and G. Shanks A situation awareness model for information security risk management Comput Secur 2014 2014 1 15
    • (2014) Comput Secur , vol.2014 , pp. 1-15
    • Webb, J.1    Ahmad, A.2    Maynard, S.B.3    Shanks, G.4
  • 199
    • 79952913713 scopus 로고    scopus 로고
    • Information security risk assessment methodology research: Group decision making and analytic hierarchy process
    • Z. Xinlan, H. Zhifang, W. Guangfu, and Z. Xin Information security risk assessment methodology research: group decision making and analytic hierarchy process 2010 Second world congress on software engineering 2010 157 160
    • (2010) 2010 Second World Congress on Software Engineering , pp. 157-160
    • Xinlan, Z.1    Zhifang, H.2    Guangfu, W.3    Xin, Z.4
  • 201
    • 78049361506 scopus 로고    scopus 로고
    • A process model for forensic analysis of Symbian
    • Springer Berlin Heidelberg
    • X. Yu, L. Jiang, H. Shu, Q. Yin, and T. Liu A process model for forensic analysis of Symbian Advances in software engineering 2009 Springer Berlin Heidelberg 86 93
    • (2009) Advances in Software Engineering , pp. 86-93
    • Yu, X.1    Jiang, L.2    Shu, H.3    Yin, Q.4    Liu, T.5
  • 202
    • 0034300584 scopus 로고    scopus 로고
    • Intrusion-detection for incident-response, using a military battlefield-intelligence process
    • J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, and M. Huang Intrusion-detection for incident-response, using a military battlefield-intelligence process Comput Netw 34 2000 2000 671 697
    • (2000) Comput Netw , vol.34 , Issue.2000 , pp. 671-697
    • Yuill, J.1    Wu, F.2    Settle, J.3    Gong, F.4    Forno, R.5    Huang, M.6
  • 203
    • 79951577864 scopus 로고    scopus 로고
    • Model-based qualitative risk assessment for availability of IT infrastructures
    • E. Zambon, S. Etalle, R.J. Wieringa, and P. Hartel Model-based qualitative risk assessment for availability of IT infrastructures Softw Syst Model 10 4 2010 553 580
    • (2010) Softw Syst Model , vol.10 , Issue.4 , pp. 553-580
    • Zambon, E.1    Etalle, S.2    Wieringa, R.J.3    Hartel, P.4
  • 209
    • 84902278436 scopus 로고    scopus 로고
    • Designing a formal model facilitating collaborative information sharing for community cyber security
    • W. Zhao, and G. White Designing a formal model facilitating collaborative information sharing for community cyber security 2014 47th Hawaii international conference on system sciences 2014 1987 1996
    • (2014) 2014 47th Hawaii International Conference on System Sciences , pp. 1987-1996
    • Zhao, W.1    White, G.2
  • 211
    • 84857224540 scopus 로고    scopus 로고
    • Cyber forensics in the cloud
    • S. Zimmerman, and D. Glavach Cyber forensics in the cloud IAnewsletter 14 1 2011 4 7
    • (2011) IAnewsletter , vol.14 , Issue.1 , pp. 4-7
    • Zimmerman, S.1    Glavach, D.2
  • 212
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Gener Comput Syst 28 3 2012 583 592
    • (2012) Future Gener Comput Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 213
    • 84888877788 scopus 로고    scopus 로고
    • Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators responsive behavior
    • S. Zonouz, and P. Haghani Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators responsive behavior Comput Secur 39 2013 2013 190 200
    • (2013) Comput Secur , vol.39 , Issue.2013 , pp. 190-200
    • Zonouz, S.1    Haghani, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.