Advanced Search

Content Type

Topics

Publication Date

Responding to Intrusions

Abstract

These practices are intended primarily for system and network administrators, managers of information systems, and security personnel responsible for networked information resources. These practices are applicable to your organization if your networked systems infrastructure includes host systems providing services to multiple users (file servers, timesharing systems, database servers, Internet servers, etc.) local-area or wide-area networks direct connections, gateways, or modem access to and from external networks, such as the Internet We recommend that you read all of the practices in this module before taking any action. To successfully implement the practices, it is important that you understand the overall context and relationships among them. For instance, once you read the practices in the Handle category, it is easier to understand the Practices in the Prepare category (see the Summary of recommended practices table). If you are dealing with an intrusion, you may want to skip the first two preparatory practices and move immediately to Practice 3, Analyze all information necessary to characterize an intrusion. Once you have completed your response and recovery process, we recommend that you review and implement the preparatory practices.

Cite This Report

Show Citation Formats

SEI

Kossakowski, Klaus-Peter; Wilson, William; Allen, Julia; Albert, Cecilia; Cohen, Cory; Ford, Gary; Fraser, Barbara; Hayes, Eric; Kochmar, John; & Konda, Suresh. Responding to Intrusions (CMU/SEI-99-SIM-006). Software Engineering Institute, Carnegie Mellon University, 1999. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=13187

IEEE

Kossakowski. Klaus-Peter, Wilson. William, Allen. Julia, Albert. Cecilia, Cohen. Cory, Ford. Gary, Fraser. Barbara, Hayes. Eric, Kochmar. John, and Konda. Suresh, "Responding to Intrusions," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania, Security Improvement Module CMU/SEI-99-SIM-006, 1999. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=13187

APA

Kossakowski, Klaus-Peter., Wilson, William., Allen, Julia., Albert, Cecilia., Cohen, Cory., Ford, Gary., Fraser, Barbara., Hayes, Eric., Kochmar, John., & Konda, Suresh. (1999). Responding to Intrusions (CMU/SEI-99-SIM-006). Retrieved July 31, 2014, from the Software Engineering Institute, Carnegie Mellon University website: http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=13187

CHI

Klaus-Peter Kossakowski, William Wilson, Julia Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Eric Hayes, John Kochmar, & Suresh Konda. Responding to Intrusions (CMU/SEI-99-SIM-006). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1999. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=13187

MLA

Kossakowski, Klaus-Peter., Wilson, William., Allen, Julia., Albert, Cecilia., Cohen, Cory., Ford, Gary., Fraser, Barbara., Hayes, Eric., Kochmar, John., & Konda, Suresh. 1999. Responding to Intrusions (Technical Report CMU/SEI-99-SIM-006). Pittsburgh: Software Engineering Institute, Carnegie Mellon University. http://resources.sei.cmu.edu/library/asset-view.cfm?AssetID=13187