Limit search to available items
Book Cover
E-book
Author Hathaway, M

Title Best Practices in Computer Network Defense : Incident Detection and Response
Published IOS Press, 2014
©2014

Copies

Description 1 online resource
Series NATO science for peace and security series. Sub-series D. Information and communication security, 1874-6268 ; volume 35
NATO science for peace and security series. Sub-series D, Information and communication security ; volume 35.
Contents Title Page; Foreword; Preface; About the Authors; Acknowledgements; Contents; About the NATO Cooperative Cyber Defence Centre of Excellence; About the Global Cyber Security Center (GCSEC); About the Geneva Centre for Security Policy (GCSP); Introduction; Advanced Research Workshop Findings; Computer Network Defense: New Threats and Trends; Advanced Technologies/Tactics Techniques, Procedures: Closing the Attack Window, and Thresholds for Reporting and Containment; Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security; Back to Basics: Beyond Network Hygiene
Aligning National Cyber Security Strategies to International Guidance: A First Step Toward Improving Incident Response Capabilities Across NATOEvolution of National and Corporate CERTs -- Trust, the Key Factor; Standards for Cyber Security; A Model for Positive Change: Influencing Positive Change in Cyber Security Strategy, Human Factor, and Leadership; Coordination and Cooperation in Cyber Network Defense: The Dutch Efforts to Prevent and Respond; Conclusions; Subject Index; Author Index
Summary The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against malicious cyber activity. This book presents 10 papers and 21 specific findings from the NATO Advanced Research Workshop (ARW) 'Best Practices in Computer Network Defense (CND): Incident Detection and Response, held in Geneva, Switzerland, in September 2013. The workshop was attended by a multi-disciplinary team of experts from 16 countries and thre
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Cyberinfrastructure -- Security measures.
Computer networks -- Security measures.
Computer security
Situational awareness.
Computer Security
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Situational awareness
Computer security
Computer networks -- Security measures
Genre/Form Conference papers and proceedings
Form Electronic book
ISBN 1306460964
9781306460965
9781614993728
1614993726
1614993718
9781614993711