Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 10 of 22 results for Critical Infrastructure Protection

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Information ...

In this paper, the authors present the findings of research examining reported insider incidents in information technology and telecommunications sectors.

White Paper | January 2008 - White Paper Insider Threat Study: Illicit Cyber Activity in the Government ...

In this paper, the authors present the findings of a research effort to examine reported insider incidents within the government sector.

White Paper | May 2005 - White Paper Secret Service and CERT Release Report Analyzing Acts of ...

This press release is the second in a series of reports focusing on insider threats to information systems and data in critical infrastructure sectors.

Technical Note | January 2014 - Technical Note A Proven Method for Identifying Security Gaps in International ... By Greg Crabb (United States Postal Service), Julia H. Allen, Pamela D. Curtis, Nader Mehravari

In this report, the authors describe a method of identifying physical security gaps in international mail processing centers and similar facilities.

Webinar | June 2014 - Webinar Department of Homeland Security Cyber Resilience Review ... By Matthew J. Butkovic

Watch Matthew Butkovic discuss the Department of Homeland Security Cyber Resilience Review (Case Study) from the SEI Virtual Event, CERT® Operational Resilience: Manage, Protect and Sustain

Special Report | May 2005 - Special Report Insider Threat Study: Computer System Sabotage in Critical ... By Tara Conway (National Threat Assessment Center), Susan Keverline (National Threat Assessment Center), Michelle Keeney (United States Secret Service), Eileen Kowalski (United States Secret Service), Megan Williams (National Threat Assessment Center), Dawn Cappelli, Andrew P. Moore, Stephanie Rogers, Timothy J. Shimeall

In this report, the authors seek to close the gaps in the literature that make it difficult for organizations to fully understand the insider threat.

Special Report | July 2003 - Special Report International Liability Issues for Software Quality By Nancy R. Mead

In this 2003 report, Nancy Mead focuses on international liability as it relates to information security for critical infrastructure applications.

Podcast | July 2017 - Podcast Ransomware: Best Practices for Prevention and Response By Alexander Volynkin, Angela Horneman

In this podcast, CERT researchers spell out several best practices for prevention and response to a ransomware attack.

Presentation | November 2017 - Presentation Cyber Hygiene: A Baseline Set of Practices By Matthew Trevors, Charles M. Wallen

The CERT Division's Cybersecurity Hygiene is a set of 11 practice areas for managing the most common and pervasive cybersecurity risks faced by organizations.

Technical Report | May 2016 - Technical Report Using Honeynets and the Diamond Model for ICS Threat ... By John Kotheimer, Kyle O'Meara, Deana Shick

This report presents an approach to analyzing approximately 16 gigabytes of full packet capture data collected from an industrial control system honeynet—a network of seemingly vulnerable machines designed to lure attackers.

Refine