2010
DOI: 10.21236/ada536721
|View full text |Cite
|
Sign up to set email alerts
|

Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…We prefer and adopt the more appropriate ISIMC acronym (see, for example, Stikvoort, 2010;and Haller, Merrell, Butkovic & Willke, 2011), which refers to national or sector-based teams where national ISIMCs should ideally be responsible for aiding the establishment of other lower-level capabilities or CSIRTs (see Figure 1). An ISIMC provides services and support to a constituency or client by preventing, detecting and responding to information security incidents.…”
Section: Establishment Of a National Information Security Incident Mamentioning
confidence: 99%
“…We prefer and adopt the more appropriate ISIMC acronym (see, for example, Stikvoort, 2010;and Haller, Merrell, Butkovic & Willke, 2011), which refers to national or sector-based teams where national ISIMCs should ideally be responsible for aiding the establishment of other lower-level capabilities or CSIRTs (see Figure 1). An ISIMC provides services and support to a constituency or client by preventing, detecting and responding to information security incidents.…”
Section: Establishment Of a National Information Security Incident Mamentioning
confidence: 99%
“…Given the degree of dependence of the modern society on information and communication technologies and the increasing trend of dependency, it is necessary for all states to adopt appropriate regulations and set up specific bodies in order to effectively manage the risks in critical information infrastructures [8].…”
Section: Vulnerabilities Of Critical Information Infrastructuresmentioning
confidence: 99%
“…CSIRT creation focuses on establishing CSIRT capabilities [45][46]. Aspects in this area include: (i) the scope of the CSIRT's constituency, which can be institutional, national, regional, and global when considering geographical and organizational borders; Morgus et al [47] provides an example.…”
Section: A Financial Csirtmentioning
confidence: 99%