THE METHODOLOGY FOR DETECTING AND MANAGING THE ABUSE OF IT SYSTEMS

Authors

  • Mirosław Ryba Ernst & Young Business Advisory
  • Józef Sulwiński Ernst & Young Business Advisory
  • Aleksander Poniewierski Ernst & Young Business Advisory

DOI:

https://doi.org/10.7494/csci.2008.9.3.121

Keywords:

Incident handling, security breach, SANS, NIST, CERT, ISO

Abstract

This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to security violations in a systematic and efficient way. Based onpresented methodologies, announced and supported by such credible organizations as SANS,NIST, CERT R or ISO, authors present their own methodology. It takes into account selectedaspects of these methodologies, with the purpose of creation a systematic and coherentapproach to the process of detecting and reacting to abuses in IT systems.

Downloads

Download data is not yet available.

References

CERT/CC, CERT/CC: Statistics. http://www.cert.org/stats/cert_stats.

html

Department of The Navy, Computer Incident Response Guidebook, Module 19 – Information Systems Security (Infosec) Program Guidelines. NAVSO P-5239-19, August 1996

Mukund B.: Computer Security Incident Handling Step by Step. Version 1.5, May 1998

NIST National Institute of Standards and Technology. Special Publication 800-61, Computer Security Incident Handling Guide – Recommendations of the National Institute of Standards and Technology, January 2004

Killcrece G., Kossakowski K.P., Ruefle R., Zajicek M.: Organizational Models for Computer Security Incident Response Teams (CSIRTs). Carnegie Mellon University

Software Engineering Institute, Pittsburgh, PA 15213-3890, December 2003

Alberts C., Dorofee A., Killcrece G., Ruefle R., Zajicek M.: Defining Incident Management Processes for CSIRTs: A Work in Progress. Carnegie Mellon University Software Engineering Institute, Pittsburgh, PA 15213-3890, October 2004

Rezmierski V., Carroll A., Hine J.: Incident Cost Analysis and Modeling Project. The University of Michigan, 2000

Ryba M: Oparta na koncepcji rywalizacji metoda analizy ryzyka systemów informatycznych. Computer Science, UWND AGH, Kraków, 2004

Ryba M., Sulwiński J.: A systematic approach to the process of detecting and reacting to IT systems abuse. IV Międzynarodowy Kongres Audytu, Kontroli Wewnętrznej i Procedur Wykrywania oraz Zapobiegania Oszustwom Gospodarczym – conference papers, Kraków, 16–17 June 2005

Downloads

Published

2013-04-20

How to Cite

Ryba, M., Sulwiński, J., & Poniewierski, A. (2013). THE METHODOLOGY FOR DETECTING AND MANAGING THE ABUSE OF IT SYSTEMS. Computer Science, 9(3), 121. https://doi.org/10.7494/csci.2008.9.3.121

Issue

Section

Articles

Most read articles by the same author(s)