Klaus-Peter Kossakowski
Software Engineering Institute
Publications by Klaus-Peter Kossakowski
-
Organizational Models for Computer Security Incident Response Teams (CSIRTs)
December 01, 2003 • Handbook
Georgia KillcreceKlaus-Peter KossakowskiRobin Ruefle
This 2003 report describes different organizational models for implementing incident handling capabilities, including each model's advantages and disadvantages and the kinds of incident management services that best fit with it.
read -
State of the Practice of Computer Security Incident Response Teams (CSIRTs)
October 01, 2003 • Technical Report
Georgia KillcreceKlaus-Peter KossakowskiRobin Ruefle
In this 2003 report, the authors provide a study of the state of the practice of incident response, based on how CSIRTs around the world are operating.
read -
Handbook for Computer Security Incident Response Teams (CSIRTs)
April 01, 2003 • Handbook
Moira West BrownDon StikvoortKlaus-Peter Kossakowski
In this 2003 handbook, the authors describe different organizational models for implementing incident handling capabilities.
read -
Securing Public Web Servers
May 01, 2000 • Security Improvement Module
Klaus-Peter KossakowskiJulia H. Allen
The practices recommended in this 2000 report are designed to help administrators mitigate the risks associated with several known security problems.
read -
Securing Network Servers (2000)
April 01, 2000 • Security Improvement Module
Julia H. AllenKlaus-Peter KossakowskiGary Ford
The practices recommended in this report from 2000 are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
Responding to Intrusions
February 01, 1999 • Security Improvement Module
Klaus-Peter KossakowskiSuresh KondaWilliam R. Wilson
This 1999 report is one of a series of SEI publications that are intended to provide practical guidance to help organizations improve the security of their networked computer systems. This report is intended for system and network administrators, managers of information systems, and security personnel responsible for networked information resources.
read -
Securing Network Servers (1999)
February 01, 1999 • Security Improvement Module
Gary FordDerek SimmelDwayne Vermeulen
The practices recommended in this 1999 report are designed to help administrators configure and deploy network servers that satisfy organizational security requirements.
read -
Preparing to Detect Signs of Intrusion
June 01, 1998 • Security Improvement Module
John KochmarJulia H. AllenChristopher J. Alberts
The practices contained in this 1998 report identify advance preparations you must make to enable you to obtain evidence of an intrusion or an intrusion attempt.
read