Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Klaus-Peter Kossakowski"'
Publikováno v:
Datenschutz und Datensicherheit - DuD. 40:17-21
Das IT-Sicherheitsgesetz verlangt die Meldung wesentlicher Vorfalle, welche zu Ausfallen oder Beeintrachtigungen von kritischen Infrastrukturen gefuhrt haben oder hatten fuhren konnen. Die Definition der dafur zu verwendenden Vorfallsklassifikation s
Publikováno v:
2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF).
To manage cybersecurity risks in practice, a simple yet effective method to assess suchs risks for individual systems is needed. With time-to-compromise (TTC), McQueen et al. (2005) introduced such a metric that measures the expected time that a syst
Publikováno v:
PIK - Praxis der Informationsverarbeitung und Kommunikation. 27:202-208
Autor:
Joao Nuno Ferreira, Damir Rajnovic, Klaus-Peter Kossakowski, Alf Hansen, Don Stikvoort, Olaf Schjelderup, Tomaz Klobucar, Manuel Medina
Publikováno v:
Computer Networks and ISDN Systems. 28:1947-1952
The European Coordination function is regarded as a service to the European CERTs and Incident Response Teams.
When a computer security attack on an organization occurs, an intrusion is recognized, or some other kind of computer security incident occurs, it is critical for the organization to have a fast and effective means of responding. One method of addres
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4b9b1c8354a305bbcc6c88d4c0ea9f3a
Keeping organizational information assets secure in today's interconnected computing environment is a challenge that becomes more difficult with each new "e" product and each new intruder tool. There is no one solution for securing information assets
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4181c3b71ed691a68cd444d86616aaa8
Autor:
West-Brown, Moira, Stikvoort, Don, Klaus-Peter Kossakowski, Killcrece, Georgia, Ruefle, Robin M., Zajicek, Mark T.
This document provides guidance on forming and operating a computer security incident response team (CSIRT). In particular, it helps an organization to define and document the nature and scope of a computer security incident handling service, which i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5c60c0adc07be301936bd466127af3f3
The World Wide Web is one of the most important ways for your organization to publish information, interact with Internet users, and establish an e-commerce business presence. However, if you are not rigorous in securely configuring and operating a p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0d9d18d6a98a6ab1098270a04c820756
https://doi.org/10.21236/ada379928
https://doi.org/10.21236/ada379928
The development of computer networks has resulted in an important class of computers: network servers. The primary purpose of these machines is to provide services, including both computational and data services, to other computers on the network. Be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::cc2c83dde8915415aeada3611b4d99b6
https://doi.org/10.21236/ada361387
https://doi.org/10.21236/ada361387