Computer Emergency Response Team
Computer Emergency Response Team
Overview of Computer Emergency Response Team in relation to cyber crime: [1]CERT/CC® was charged with developing research capabilities in the area of security analysis and education capability in the areas of incident prevention and handling.
Resources
Notes and References
1. By Jim Moore
See Also
- Types of Cybercrime
- Cybercriminal
Further Reading
Alberts, C., et al. (2004, October). Defining incident management processes for CSIRTs: A work in progress. Available at (internet link) cert.org/archive/pdf/ 04tr015.pdf; CERT Charter. (1988). Meet CERT. Available at (internet link) cert.org/ meet_cert/meetcertcc.html; GLBA Safeguards Rule. (2002, May 23). Available at (internet link) ftc.gov/os/2002/05/67fr36585.pdf; Grance, T., et al. (2004, January). Computer security incident handling guide. NIST Special Publication 800-61. Available at https://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf; HIPAA Security Rule. (2003, February 20). Available at (internet link) cms.hhs.gov/SecurityStandard/ Downloads/securityfinalrule.pdf; Osborne, T.R. (2001, July 3). Building an Incident Response Program To Suit Your Business. Available at (internet link) www2.sansorg/reading _room/whitepapers/incident/627.php; Page, B. (1988). A report on the internet worm. Retrieved November 22, 2007, from https://ftp.cerias.purdue.edu/pub/doc/morris _worm/worm.paper.