Computer Emergency Response Team

Computer Emergency Response Team

Computer Emergency Response Team

Overview of Computer Emergency Response Team in relation to cyber crime: [1]CERT/CC® was charged with developing research capabilities in the area of security analysis and education capability in the areas of incident prevention and handling.

Resources

Notes and References

1. By Jim Moore

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Alberts, C., et al. (2004, October). Defining incident management processes for CSIRTs: A work in progress. Available at (internet link) cert.org/archive/pdf/ 04tr015.pdf; CERT Charter. (1988). Meet CERT. Available at (internet link) cert.org/ meet_cert/meetcertcc.html; GLBA Safeguards Rule. (2002, May 23). Available at (internet link) ftc.gov/os/2002/05/67fr36585.pdf; Grance, T., et al. (2004, January). Computer security incident handling guide. NIST Special Publication 800-61. Available at https://csrc.nist.gov/publications/nistpubs/800-61/sp800-61.pdf; HIPAA Security Rule. (2003, February 20). Available at (internet link) cms.hhs.gov/SecurityStandard/ Downloads/securityfinalrule.pdf; Osborne, T.R. (2001, July 3). Building an Incident Response Program To Suit Your Business. Available at (internet link) www2.sansorg/reading _room/whitepapers/incident/627.php; Page, B. (1988). A report on the internet worm. Retrieved November 22, 2007, from https://ftp.cerias.purdue.edu/pub/doc/morris _worm/worm.paper.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *