The Methodology For Detecting And Managing The Abuse Of It Systems
This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to secur...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
AGH University of Science and Technology Press
2008-01-01
|
Series: | Computer Science |
Subjects: | |
Online Access: | http://journals.agh.edu.pl/csci/article/download/193/114 |
id |
doaj-fd4d248e92a248d3820bf47f8f58e727 |
---|---|
record_format |
Article |
spelling |
doaj-fd4d248e92a248d3820bf47f8f58e7272020-11-24T22:47:59ZengAGH University of Science and Technology PressComputer Science1508-28062008-01-01912110.7494/csci.2008.9.3.121The Methodology For Detecting And Managing The Abuse Of It SystemsMirosław Ryba0Józef Sulwiński1Aleksander Poniewierski2Ernst & Young Business AdvisoryErnst & Young Business AdvisoryErnst & Young Business AdvisoryThis paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to security violations in a systematic and efficient way. Based onpresented methodologies, announced and supported by such credible organizations as SANS,NIST, CERT R or ISO, authors present their own methodology. It takes into account selectedaspects of these methodologies, with the purpose of creation a systematic and coherentapproach to the process of detecting and reacting to abuses in IT systems.http://journals.agh.edu.pl/csci/article/download/193/114Incident handling; security breach; SANS; NIST; CERT; ISO |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mirosław Ryba Józef Sulwiński Aleksander Poniewierski |
spellingShingle |
Mirosław Ryba Józef Sulwiński Aleksander Poniewierski The Methodology For Detecting And Managing The Abuse Of It Systems Computer Science Incident handling; security breach; SANS; NIST; CERT; ISO |
author_facet |
Mirosław Ryba Józef Sulwiński Aleksander Poniewierski |
author_sort |
Mirosław Ryba |
title |
The Methodology For Detecting And Managing The Abuse Of It Systems |
title_short |
The Methodology For Detecting And Managing The Abuse Of It Systems |
title_full |
The Methodology For Detecting And Managing The Abuse Of It Systems |
title_fullStr |
The Methodology For Detecting And Managing The Abuse Of It Systems |
title_full_unstemmed |
The Methodology For Detecting And Managing The Abuse Of It Systems |
title_sort |
methodology for detecting and managing the abuse of it systems |
publisher |
AGH University of Science and Technology Press |
series |
Computer Science |
issn |
1508-2806 |
publishDate |
2008-01-01 |
description |
This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to security violations in a systematic and efficient way. Based onpresented methodologies, announced and supported by such credible organizations as SANS,NIST, CERT R or ISO, authors present their own methodology. It takes into account selectedaspects of these methodologies, with the purpose of creation a systematic and coherentapproach to the process of detecting and reacting to abuses in IT systems. |
topic |
Incident handling; security breach; SANS; NIST; CERT; ISO |
url |
http://journals.agh.edu.pl/csci/article/download/193/114 |
work_keys_str_mv |
AT mirosławryba themethodologyfordetectingandmanagingtheabuseofitsystems AT jozefsulwinski themethodologyfordetectingandmanagingtheabuseofitsystems AT aleksanderponiewierski themethodologyfordetectingandmanagingtheabuseofitsystems AT mirosławryba methodologyfordetectingandmanagingtheabuseofitsystems AT jozefsulwinski methodologyfordetectingandmanagingtheabuseofitsystems AT aleksanderponiewierski methodologyfordetectingandmanagingtheabuseofitsystems |
_version_ |
1725680179580239872 |