Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/9855
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mepham, K | - |
dc.contributor.author | Louvieris, P | - |
dc.contributor.author | Ghinea, G | - |
dc.contributor.author | Clewley, N | - |
dc.date.accessioned | 2015-01-21T09:49:11Z | - |
dc.date.available | 2014-10-03 | - |
dc.date.available | 2015-01-21T09:49:11Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | 6th International Conference on Cyber Conflict, (CYCON 2014), 121 - 136, (3-6 June 2014) | en_US |
dc.identifier.isbn | 978-9949-9544-0-7 | - |
dc.identifier.issn | 2325-5366 | - |
dc.identifier.uri | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6916399 | - |
dc.identifier.uri | http://bura.brunel.ac.uk/handle/2438/9855 | - |
dc.description | Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. | en_US |
dc.description.abstract | Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation. | en_US |
dc.format.extent | 121 - 136 | - |
dc.format.extent | 121 - 136 | - |
dc.language.iso | en | en_US |
dc.publisher | IEEE Computer Society | en_US |
dc.subject | Cyber Incident Response Active Passive Risk | en_US |
dc.title | Dynamic cyber-incident response | en_US |
dc.type | Conference Paper | en_US |
dc.identifier.doi | http://dx.doi.org/10.1109/CYCON.2014.6916399 | - |
dc.relation.isPartOf | International Conference on Cyber Conflict, CYCON | - |
dc.relation.isPartOf | International Conference on Cyber Conflict, CYCON | - |
pubs.organisational-data | /Brunel | - |
pubs.organisational-data | /Brunel/Brunel Staff by College/Department/Division | - |
pubs.organisational-data | /Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences | - |
pubs.organisational-data | /Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences/Dept of Computer Science | - |
pubs.organisational-data | /Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences/Dept of Computer Science/Computer Science | - |
pubs.organisational-data | /Brunel/University Research Centres and Groups | - |
pubs.organisational-data | /Brunel/University Research Centres and Groups/School of Health Sciences and Social Care - URCs and Groups | - |
pubs.organisational-data | /Brunel/University Research Centres and Groups/School of Health Sciences and Social Care - URCs and Groups/Brunel Institute for Ageing Studies | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Fulltext.pdf | 1.64 MB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.