This study develops categories of responses to security incidents, based on a grounded theory analysis of interviews with security practitioners, with a focus on the tasks performed during security incidents, and the necessary resources to perform these tasks. The results include a list of types of incidents, a model for the tasks, the skills employed, and the strategies used during security incidents. A security incident can be understood in terms of three stages: detection, analysis, and response. Each stage is comprised by tasks that are performed using different skills, strategies, and resources. We also recommend that development of security tools focus on: correlation of multiple sources of information, including the activities of dif...
Our case analysis presents and identifies significant and systemic shortcomings of the incident resp...
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use f...
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automatio...
Purpose — The purpose of this study is to examine security incident response practices of IT securit...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
This study investigates how security practitioners perform diagnostic work during the identification...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Abstract. Incident response is a critical security function in organisations that aims to manage inc...
Industrial reports indicate that security incidents continue to inflict large financial losses on or...
Security incidents detected by information technology-dependent organisations are escalating in both...
Recent attacks and threat reports indicate that industrial control organizations are attractive targ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Cyber Threat Intelligence (CTI) is threat informa- tion intended for security purposes. However, use...
Our case analysis presents and identifies significant and systemic shortcomings of the incident resp...
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use f...
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automatio...
Purpose — The purpose of this study is to examine security incident response practices of IT securit...
Purpose – The purpose of this paper is to examine security incident response practices of informatio...
This study investigates how security practitioners perform diagnostic work during the identification...
This thesis investigates four different aspects of information security management: challenges faced...
This thesis investigates four different aspects of information security management: challenges faced...
We present the results of an interview study on the state of practice for Situational Awareness (SA)...
Abstract. Incident response is a critical security function in organisations that aims to manage inc...
Industrial reports indicate that security incidents continue to inflict large financial losses on or...
Security incidents detected by information technology-dependent organisations are escalating in both...
Recent attacks and threat reports indicate that industrial control organizations are attractive targ...
This study investigates the context of interactions of IT security practitioners, based on a qualita...
Cyber Threat Intelligence (CTI) is threat informa- tion intended for security purposes. However, use...
Our case analysis presents and identifies significant and systemic shortcomings of the incident resp...
Cyber Threat Intelligence (CTI) is threat information intended for security purposes. However, use f...
Cyber-physical systems (CPSs) are part of many critical infrastructures such as industrial automatio...