- : Executing a Policy
- Security Incident Response
- Computer Security Incident Response Teams
- Preparing for Incident Response
- Management of Security by Teams
- Execution of an Incident Response
- Evaluation of a Security Incident
- Containing the Incident
- Eradicating the Incident
- Recovering From an Incident
- Article Series
- About the Author
- Acknowledgements
- References
- Ordering Sun Documents
- Accessing Sun Documentation Online
References
The following references were used to write this article:
Brazilian National Research Network, "References on Network Security and Network Security Teams in Brazil," http://www.rnp.br/cais_en/cais-referencias.html
Beattie, S., et al., "Timing the Application of Security Patches for Optimal Value," Proceeding of LISA '02: Sixteenth Systems Administration Conference, Berkeley, CA, USENIX Association, 2002
CERT, Software Engineering Institute, "CSIRT FAQ," Carnegie Mellon University, 2002, http://www.cert.org/csirts/csirt_faq.html
CERT, Software Engineering Institute, Handbook for Computer Incident Response Teams, Carnegie Mellon University, December 1998
CSI and FBI, "2002 CSI/FBI Computer Crime and Security Survey," January 2003, and similar reports from earlier years
DFN-CERT, Germany, "Glossary of Computer Security Incident Handling Terms and Abbreviations," September 2002, http://www.cert.dfn.de/eng/pre99papers/certterm.html
EICAR, European Institute of Computer Anti-Virus Research, http://www.eicar.org
Fraser, B., ed. Site Security Handbook, RFC 2196, Internet Engineering Task Force, September 1997
ITU-T Recommendations X.509, ISO/IEC 9594-8: "Information Technology - Open Systems Interconnection - The Directory: Public Key and Attribute Certification Frameworks"
Masurkar, Vijay, "Responding to a Customer's Security Incidents (Part I): Establishing Teams and a Policy," Sun BluePrints OnLine, March 2003, http://www.sun.com/blueprints/
Noordergraaf, Alex, Enterprise Security: Solaris Operating Environment, Sun Microsystems Press, Prentice Hall, 2002
Rude, T., "DD and Computer Forensics,"http://www.crazytrain.com/dd.html
Shultz, E., and R. Shumway, Incident Response: A Strategic Guide to Handling System and Network Security Breaches, New Riders Publishing, November, 2001
Sun Microsystems, Inc., Solaris Security Toolkit, http//http://www.sun.com/software/security/jass and http://www.sun.com/blueprints/tools
Sun Microsystems, Inc., "The Solaris Fingerprint Database - A Security Tool for Solaris Operating Environment Files," 2003
United States of America's Federal Computer Incident Response Center (FEDRIC), http://www.fedric.gov/