ENHANCING CYBERSECURITY INCIDENT RESPONSE: A STRUCTURED APPROACH TO CSIRT ROLE ALLOCATION
(1) Information Technology Department, Gulf College, Hafr Albatin
Corresponding Author
Abstract
Keywords
References
Nyre-Yu, M., Gutzwiller, R.S. and Caldwell, B.S. (2019) ‘Observing cyber security incident response: Qualitative themes from field research’, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 63(1), pp. 437–441. doi:10.1177/1071181319631016.
Nyre-Yu, M., Gutzwiller, R.S. and Caldwell, B.S. (2019) ‘Observing cyber security incident response: Qualitative themes from field research’, Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 63(1), pp. 437–441. doi:10.1177/1071181319631016.
Angafor, GN, Yevseyeva, I, He, Y. Game-based learning: A review of tabletop exercises for cybersecurity incident response training. Security and Privacy. 2020; 3:e126. https://doi.org/10.1002/spy2.126Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
Villegas-Ch., W.; Ortiz-Garces, I.; Sánchez-Viteri, S.Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus. Computers 2021, 10, 102. ttps://doi.org/10.3390/computers10080102
Retnowardhani, A., Diputra, R.H. and Triana, Y.S. (2019) ‘Security Risk Analysis of bring your own device system in manufacturing company at Tangerang’, TELKOMNIKA (Telecommunication Computing Electronics and Control), 17(2), p. 753. doi:10.12928/telkomnika.v17i2.10165.
Nasser, M., Ahmad, R., Yassin, W., Hassan, A., Zainal, Z., Salih, N., & Hameed, K. (2018). Cyber-security incidents: A review cases in Cyber-Physical Systems. International Journal of Advanced Computer Science and Applications, 9(1).
Fransen, F., Smulders, A., & Kerkdijk, R. (2015). Cyber security information exchange to gain insight into the effects of cyber threats and incidents. Elektrotechnik Und Informationstechnik, 132(2), 106–112. https://doi.org/10.1007/s00502-015-0289-2
Bhardwaj, A., & Sapra, V. (Eds.). (2021). Security Incidents & Response Against Cyber Attacks. Springer International Publishing.
Austin, G. (2020). Cyber security education: Principles and policies. Routledge Studies in Conflict, Security and Technology.
Nyre-Yu, M., Gutzwiller, R.S., Caldwell, B.S. (2019). Observing Cyber Security Incident Response: Qualitative Themes from Field Research. Proceedings of the Human Factors and Ergonomics Society Annual Meeting , 63(1), pp. 437–441.
Bhaskar, R. (2005). A Proposed Integrated Framework for Coordinating Computer Security Incident Response Team. Journal of Information Privacy and Security .
Goundar, S. (2021). Introduction to Security Incidents and Response Against Cyber Attacks. EAI/Springer Innovations in Communication and Computing .
Ruefle, R., et al. (2014). Computer Security Incident Response Team Development and Evolution. IEEE Security & Privacy .
Botirov, F., et al. (2021). Identification of Key Persons in the Information Security Incident Management Process and Distribution of Roles Between Them. Tehnika Fanlari Va Innovaciâ .
Article Metrics
Abstract View
: 266 times
Download : 88 times
DOI: 10.56327/ijiscs.v9i2.1826
Refbacks
- There are currently no refbacks.





