2017
DOI: 10.3389/fpsyg.2017.02179
|View full text |Cite
|
Sign up to set email alerts
|

Computer Security Incident Response Team Effectiveness: A Needs Assessment

Abstract: Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would be likely to encounter problems. A needs assessment was done to see to which extent this argument holds true. We constr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 21 publications
0
19
0
Order By: Relevance
“…8) Knowledge Sharing (guidance, advisories): 3C-CSIRT shares technical guidance and advisories that form a precautionary step for the constituency's systems or networks from cyber intrusion activities. A CSIRT is not something like operating in a vacuum, but it must operate in the context of a complex sociotechnical environment or system [9]. Therefore, 3C-CSIRT should share its practical experience regarding cyber incidents, vulnerabilities or other security issues with its constituencies as well as with other external CSIRTs, either locally or internationally, for better cooperation and coordination.…”
Section: ) 3c-csirt Servicesmentioning
confidence: 99%
See 2 more Smart Citations
“…8) Knowledge Sharing (guidance, advisories): 3C-CSIRT shares technical guidance and advisories that form a precautionary step for the constituency's systems or networks from cyber intrusion activities. A CSIRT is not something like operating in a vacuum, but it must operate in the context of a complex sociotechnical environment or system [9]. Therefore, 3C-CSIRT should share its practical experience regarding cyber incidents, vulnerabilities or other security issues with its constituencies as well as with other external CSIRTs, either locally or internationally, for better cooperation and coordination.…”
Section: ) 3c-csirt Servicesmentioning
confidence: 99%
“…Therefore, 3C-CSIRT should share its practical experience regarding cyber incidents, vulnerabilities or other security issues with its constituencies as well as with other external CSIRTs, either locally or internationally, for better cooperation and coordination. However, sharing or exchanging information and cooperation depends on the available trust models they may have with each other [9]. 9) Security Related Information Dissemination:3C-CSIRT has a website through which all the constituencies can share security-related information such as recommended tools, security patches, software updates, best practices, vulnerabilities, and incidents in English as well as in their native language for better understanding.…”
Section: ) 3c-csirt Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…I am interviewing others who perform my role, as well as senior leaders within those organisations, using semi-structured interviews to inquire into any differences in perception and expectations as well as motivations and contexts. As semi-structured interviewing has become established as a core, and arguably the default, qualitative data-gathering method across the social sciences, for example, Coronel et al (2011) and Rainford (2020), and related disciplines, including business, for example, Maznevski and Chudoba (2000) and Peterson (2004), and cyber-security, for example, Ashenden and Sasse (2013), Singh et al (2013) and Van der Kleij et al (2017), researchers, like myself, that gather data using this method are faced with the task of preparing that data for analysis. For novice researchers, in particular, the predominant guidance from the literature, for example, Hammersley and Atkinson (1995) and Bryman (2012: 482) is for manual, verbatim (Seale, 2000: 148) transcriptions of audio-recorded interviews to be prepared in 'orthographic' (Braun and Clarke, 2006: 88) form for subsequent analysis, despite the acknowledged limitations of transcripts themselves (DeVault, 1990;Green et al, 1997;Lapadat and Lindsay, 1999;ten Have, 1990).…”
Section: Introductionmentioning
confidence: 99%
“…At the same time, rapid changes in security threat landscapes cause uncertainty for business continuity and may force changes to organizations' security strategy [8]. A solution is to automate the handwork or to provide forecasting analysts with proper decision support tools that could help reduce ambiguity or even predict future developments (see also [8,10]). There have already been extensive efforts in government, academia, and industry to do so [11].…”
Section: Introductionmentioning
confidence: 99%