Incident Response: Information security incident response

作者: Abiola Abimbola

DOI: 10.1016/S1353-4858(07)70103-4

关键词:

摘要: As computer technology and the internet becomes rapidly dispersed, employees are encountering more ethically difficult situations than ever before. Despite fact that organisations have developed implemented a number of security countermeasures, abuse continues to be problem.^1

参考文章(5)
Erik Guldentops, Governing information technology through COBIT security in information systems. pp. 115- 159 ,(2001) , 10.1007/978-0-387-35583-2_8
N. Brownlee, E. Guttman, Expectations for Computer Security Incident Response RFC. ,vol. 2350, pp. 1- 38 ,(1998)
Jay-Evan J. Tevis, John A. Hamilton, Methods for the prevention, detection and removal of software security vulnerabilities Proceedings of the 42nd annual Southeast regional conference on - ACM-SE 42. pp. 197- 202 ,(2004) , 10.1145/986537.986583
Elizabeth Mackenzie, Kathryn Goldman, Computer abuse, information technologies and judicial affairs Proceedings of the 28th annual ACM SIGUCCS conference on User services Building the future - SIGUCCS '00. pp. 170- 176 ,(2000) , 10.1145/354908.354947
James C. Brancheau, James C. Wetherbe, Key issues in information systems management Management Information Systems Quarterly. ,vol. 11, pp. 23- 45 ,(1987) , 10.2307/248822