Suresh Konda
Software Engineering Institute
Publications by Suresh Konda
-
A Simulation Model for Managing Survivability of Networked Information Systems
December 01, 2000 • Technical Report
Soumyo D. MoitraSuresh Konda
In this 2000 report, we develop a model to evaluate the tradeoffs between the cost of defense mechanisms for networked systems and the resulting expected survivability after a network attack.
read -
The Survivability of Network Systems: An Empirical Analysis
December 01, 2000 • Technical Report
Soumyo D. MoitraSuresh Konda
This report, published in 2000, presents an extended analysis of CERT Coordination Center incidents data (from 1988 to 1995) and applies the results to simulate attacks and their impacts on network sites.
read -
Securing Network Servers (2000)
April 01, 2000 • Security Improvement Module
Julia H. AllenKlaus-Peter KossakowskiGary Ford
The practices recommended in this report from 2000 are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
Securing Desktop Workstations
February 01, 1999 • Security Improvement Module
Derek SimmelGary FordJulia H. Allen
The practices recommended in this 1999 report are designed to help you configure and deploy networked workstations that satisfy your organization‰s security requirements. The practices may also be useful in examining the configuration of previously deployed workstations.
read -
Responding to Intrusions
February 01, 1999 • Security Improvement Module
Klaus-Peter KossakowskiSuresh KondaWilliam R. Wilson
This 1999 report is one of a series of SEI publications that are intended to provide practical guidance to help organizations improve the security of their networked computer systems. This report is intended for system and network administrators, managers of information systems, and security personnel responsible for networked information resources.
read -
Securing Network Servers (1999)
February 01, 1999 • Security Improvement Module
Gary FordDerek SimmelDwayne Vermeulen
The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
An Approach for Selecting and Specifying Tools for Information Survivability
July 01, 1998 • Technical Report
Robert FirthBarbara FraserSuresh Konda
This paper proposes a lexicon of functionalities to characterize survivable systems activities, and an approach to analyze networked systems environments.
read -
Detecting Signs of Intrusion
June 01, 1998 • Security Improvement Module
Lisa CunninghamRobert FirthBarbara Fraser
The 1998 report provides guidance to help organizations improve the security of their networked computer systems.
read -
Preparing to Detect Signs of Intrusion
June 01, 1998 • Security Improvement Module
John KochmarJulia H. AllenChristopher J. Alberts
The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.
read -
Security for Information Technology Service Contracts
January 01, 1998 • Security Improvement Module
Julia H. AllenGary FordBarbara Fraser
This 1998 document is one of a new series of publications of the Software EngineeringInstitute at Carnegie Mellon University,security improvement modules.They are intended to provide concrete, practical guidance that will help organizationsimprove the security of their networked computer systems.
read -
An Evolutionary Perspective of Software Engineering Research Through Co-Word Analysis
March 01, 1996 • Technical Report
Neal CoulterIra MonarchSuresh Konda
This 1995 study applies various tools, techniques, and methods that the SEI is evaluating for analyzing information being produced at a very rapid rate in the discipline.
read -
Taxonomy-Based Risk Identification
June 01, 1993 • Technical Report
Marvin CarrSuresh KondaIra Monarch
This 1993 report describes a method for facilitating the systematic and repeatable identification of risks associated with the development of a software-dependent project.
read -
National Software Capacity: Near-Term Study (Executive Summary)
June 01, 1990 • Special Report
Jane SiegelShelby StewmanSuresh Konda
This 1990 report provides an initial overall assessment of the nation‰s capacity to produce military software, with a focus onmission-critical software.
read -
National Software Capacity: Near-Term Study
May 01, 1990 • Technical Report
Jane SiegelShelby StewmanSuresh Konda
This 1990 study provides an initial assessment of the U.S.'s industrial capacity to produce MCCR software.
read