Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Suresh Konda
December 2000 - Technical Report A Simulation Model for Managing Survivability of Networked Information Systems

Authors: Soumyo D. Moitra, Suresh Konda

In this 2000 report, we develop a model to evaluate the tradeoffs between the cost of defense mechanisms for networked systems and the resulting expected survivability after a network attack.

December 2000 - Technical Report The Survivability of Network Systems: An Empirical Analysis

Authors: Soumyo D. Moitra, Suresh Konda

This report, published in 2000, presents an extended analysis of CERT Coordination Center incidents data (from 1988 to 1995) and applies the results to simulate attacks and their impacts on network sites.

April 2000 - Security Improvement Module Securing Network Servers (2000)

Authors: Julia H. Allen, Klaus-Peter Kossakowski, Gary Ford, Suresh Konda, Derek Simmel

The practices recommended in this report from 2000 are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.

February 1999 - Security Improvement Module Securing Desktop Workstations

Authors: Derek Simmel, Gary Ford, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

The practices recommended in this 1999 report are designed to help you configure and deploy networked workstations that satisfy your organization‰s security requirements. The practices may also be useful in examining the configuration of previously deployed workstations.

February 1999 - Security Improvement Module Responding to Intrusions

Authors: Klaus-Peter Kossakowski, William R. Wilson, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda

This 1999 report is one of a series of SEI publications that are intended to provide practical guidance to help organizations improve the security of their networked computer systems. This report is intended for system and network administrators, managers of information systems, and security personnel responsible for networked information resources.

February 1999 - Security Improvement Module Securing Network Servers (1999)

Authors: Gary Ford, Dwayne Vermeulen, Julia H. Allen, Cecilia Albert, Barbara Fraser, Eric Hayes, John Kochmar, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.

July 1998 - Technical Report An Approach for Selecting and Specifying Tools for Information Survivability

Authors: Robert Firth, Barbara Fraser, Suresh Konda, Derek Simmel

This paper proposes a lexicon of functionalities to characterize survivable systems activities, and an approach to analyze networked systems environments.

June 1998 - Security Improvement Module Detecting Signs of Intrusion

Authors: Lisa Cunningham, Robert Firth, Barbara Fraser, John Kochmar, John Richael, Derek Simmel, Gary Ford, Suresh Konda

The 1998 report provides guidance to help organizations improve the security of their networked computer systems.

June 1998 - Security Improvement Module Preparing to Detect Signs of Intrusion

Authors: John Kochmar, Julia H. Allen, Cecilia Albert, Cory Cohen, Gary Ford, Barbara Fraser, Suresh Konda, Klaus-Peter Kossakowski, Derek Simmel

The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.

January 1998 - Security Improvement Module Security for Information Technology Service Contracts

Authors: Julia H. Allen, Gary Ford, Barbara Fraser, John Kochmar, Suresh Konda, Derek Simmel, Lisa Cunningham

This 1998 document is one of a new series of publications of the Software EngineeringInstitute at Carnegie Mellon University,security improvement modules.They are intended to provide concrete, practical guidance that will help organizationsimprove the security of their networked computer systems.

March 1996 - Technical Report An Evolutionary Perspective of Software Engineering Research Through Co-Word Analysis

Authors: Neal Coulter, Ira Monarch, Suresh Konda, Marvin Carr

This 1995 study applies various tools, techniques, and methods that the SEI is evaluating for analyzing information being produced at a very rapid rate in the discipline.

June 1993 - Technical Report Taxonomy-Based Risk Identification

Authors: Marvin Carr, Suresh Konda, Ira Monarch, Clay F. Walker, F. Carol Ulrich

This 1993 report describes a method for facilitating the systematic and repeatable identification of risks associated with the development of a software-dependent project.

June 1990 - Special Report National Software Capacity: Near-Term Study (Executive Summary)

Authors: Jane Siegel, Shelby Stewman, Suresh Konda, Patrick D. Larkey, W. Gary Wagner

This 1990 report provides an initial overall assessment of the nation‰s capacity to produce military software, with a focus onmission-critical software.

May 1990 - Technical Report National Software Capacity: Near-Term Study

Authors: Jane Siegel, Shelby Stewman, Suresh Konda, Patrick D. Larkey, W. Gary Wagner

This 1990 study provides an initial assessment of the U.S.'s industrial capacity to produce MCCR software.