Please use this identifier to cite or link to this item: http://buratest.brunel.ac.uk/handle/2438/9855
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMepham, K-
dc.contributor.authorLouvieris, P-
dc.contributor.authorGhinea, G-
dc.contributor.authorClewley, N-
dc.date.accessioned2015-01-21T09:49:11Z-
dc.date.available2014-10-03-
dc.date.available2015-01-21T09:49:11Z-
dc.date.issued2014-
dc.identifier.citation6th International Conference on Cyber Conflict, (CYCON 2014), 121 - 136, (3-6 June 2014)en_US
dc.identifier.isbn978-9949-9544-0-7-
dc.identifier.issn2325-5366-
dc.identifier.urihttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6916399-
dc.identifier.urihttp://bura.brunel.ac.uk/handle/2438/9855-
dc.descriptionPermission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE.en_US
dc.description.abstractTraditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation.en_US
dc.format.extent121 - 136-
dc.format.extent121 - 136-
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.subjectCyber Incident Response Active Passive Risken_US
dc.titleDynamic cyber-incident responseen_US
dc.typeConference Paperen_US
dc.identifier.doihttp://dx.doi.org/10.1109/CYCON.2014.6916399-
dc.relation.isPartOfInternational Conference on Cyber Conflict, CYCON-
dc.relation.isPartOfInternational Conference on Cyber Conflict, CYCON-
pubs.organisational-data/Brunel-
pubs.organisational-data/Brunel/Brunel Staff by College/Department/Division-
pubs.organisational-data/Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences-
pubs.organisational-data/Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences/Dept of Computer Science-
pubs.organisational-data/Brunel/Brunel Staff by College/Department/Division/College of Engineering, Design and Physical Sciences/Dept of Computer Science/Computer Science-
pubs.organisational-data/Brunel/University Research Centres and Groups-
pubs.organisational-data/Brunel/University Research Centres and Groups/School of Health Sciences and Social Care - URCs and Groups-
pubs.organisational-data/Brunel/University Research Centres and Groups/School of Health Sciences and Social Care - URCs and Groups/Brunel Institute for Ageing Studies-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
Fulltext.pdf1.64 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.