Showing 1 - 10 of 40 results for Incident Handling
In this 2003 handbook, the authors describe different organizational models for implementing incident handling capabilities.
This 2003 report describes different organizational models for implementing incident handling capabilities, including each model's advantages and disadvantages and the kinds of incident management services that best fit with it.
Tracy Cassidy and Carrie Gardner, researchers with the CERT National Insider Threat Center, discuss research on using technology to detect an employee’s intent to cause physical harm.
Tim Shimeall and Timur Snoke, researchers in the SEI’s CERT Division, examine the role of the network traffic analyst in capturing and evaluating ever-increasing volumes of network data.
These resources help you to get started when creating a new CSIRT.
This quick reference guide helps NatCSIRTs deal with DDoS attacks.
In this podcast, CERT researchers spell out several best practices for prevention and response to a ransomware attack.
This form is to be used for recommendations during the Computer Security Incident Handler(CSIH) application review phase.
This form is to be used along with a payment for renewing certification for a Certified Computer Security Incident Handler (CSIH) or Certified PSP Developer.
Jared Ettinger describes preliminary findings and best practices in cyber intelligence identified through a study sponsored by the U.S. Office of the Director of National Intelligence.