The Methodology For Detecting And Managing The Abuse Of It Systems

This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to secur...

Full description

Bibliographic Details
Main Authors: Mirosław Ryba, Józef Sulwiński, Aleksander Poniewierski
Format: Article
Language:English
Published: AGH University of Science and Technology Press 2008-01-01
Series:Computer Science
Subjects:
Online Access:http://journals.agh.edu.pl/csci/article/download/193/114
id doaj-fd4d248e92a248d3820bf47f8f58e727
record_format Article
spelling doaj-fd4d248e92a248d3820bf47f8f58e7272020-11-24T22:47:59ZengAGH University of Science and Technology PressComputer Science1508-28062008-01-01912110.7494/csci.2008.9.3.121The Methodology For Detecting And Managing The Abuse Of It SystemsMirosław Ryba0Józef Sulwiński1Aleksander Poniewierski2Ernst & Young Business AdvisoryErnst & Young Business AdvisoryErnst & Young Business AdvisoryThis paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to security violations in a systematic and efficient way. Based onpresented methodologies, announced and supported by such credible organizations as SANS,NIST, CERT R or ISO, authors present their own methodology. It takes into account selectedaspects of these methodologies, with the purpose of creation a systematic and coherentapproach to the process of detecting and reacting to abuses in IT systems.http://journals.agh.edu.pl/csci/article/download/193/114Incident handling; security breach; SANS; NIST; CERT; ISO
collection DOAJ
language English
format Article
sources DOAJ
author Mirosław Ryba
Józef Sulwiński
Aleksander Poniewierski
spellingShingle Mirosław Ryba
Józef Sulwiński
Aleksander Poniewierski
The Methodology For Detecting And Managing The Abuse Of It Systems
Computer Science
Incident handling; security breach; SANS; NIST; CERT; ISO
author_facet Mirosław Ryba
Józef Sulwiński
Aleksander Poniewierski
author_sort Mirosław Ryba
title The Methodology For Detecting And Managing The Abuse Of It Systems
title_short The Methodology For Detecting And Managing The Abuse Of It Systems
title_full The Methodology For Detecting And Managing The Abuse Of It Systems
title_fullStr The Methodology For Detecting And Managing The Abuse Of It Systems
title_full_unstemmed The Methodology For Detecting And Managing The Abuse Of It Systems
title_sort methodology for detecting and managing the abuse of it systems
publisher AGH University of Science and Technology Press
series Computer Science
issn 1508-2806
publishDate 2008-01-01
description This paper focuses on the processes of dealing with security breaches which are becomingone of the most pressing problems in every organization whose systems are connected to theglobal web. The study presents the most widely used methodologies which were designed inorder to detect and react to security violations in a systematic and efficient way. Based onpresented methodologies, announced and supported by such credible organizations as SANS,NIST, CERT R or ISO, authors present their own methodology. It takes into account selectedaspects of these methodologies, with the purpose of creation a systematic and coherentapproach to the process of detecting and reacting to abuses in IT systems.
topic Incident handling; security breach; SANS; NIST; CERT; ISO
url http://journals.agh.edu.pl/csci/article/download/193/114
work_keys_str_mv AT mirosławryba themethodologyfordetectingandmanagingtheabuseofitsystems
AT jozefsulwinski themethodologyfordetectingandmanagingtheabuseofitsystems
AT aleksanderponiewierski themethodologyfordetectingandmanagingtheabuseofitsystems
AT mirosławryba methodologyfordetectingandmanagingtheabuseofitsystems
AT jozefsulwinski methodologyfordetectingandmanagingtheabuseofitsystems
AT aleksanderponiewierski methodologyfordetectingandmanagingtheabuseofitsystems
_version_ 1725680179580239872