Klaus-Peter Kossakowski: IT Incident Response Capabilities

 

Zur Person


Größere Projekte


IT Incident Response


Publikationen


PGP-Schlüssel


Impressum


Workshop on Computer Security Incident Handling 1990

Die Arbeit  |  Teams  |  Konferenzen  |  Bibliographie

2001 2000 1999
1998 1997 1996 1995 1994
1993 1992 1991 1990 1989

 Veranstaltungsort:

Pleasanton, Calif.

 Datum:

Juni 1990

 Anmerkung:

Bei diesem zweiten Workshop wurde das Konzept von Arbeitsgruppen zugunsten einer Mischung von Vorträgen und Präsentationen aufgenommen. Das Programm war in vier Bereiche unterteilt: Plenary, Management, Dealing with Threats and Vulnerabilities und Communcations.

 Plenary:

  • Charles E. Cole (LLNL, USA) / The Challenge of Incident Handling
  • William Scherlis (DARPA, USA) / The CERT Concept: Scaling Up
  • Michael Odawa (Software Development Councile, USA) / Viruses and Their Implications for Commercial Software

 Management Issues:

  • Legal Issues:
    • Vorträge von Mark D. Rasch (DoJ, USA) und James J. Kolouch (FBI, USA)
    • Stephen E. Hansen (Stanford, USA) / Legal Issues, A Site Manager's Nightmare
  • Forming and Managing a Response Team
    • E. Eugene Schulz Jr. (CIAC, USA) / Forming and Managing CIAC : Lessons Learned [Schultz Jr. 1990a]
    • Richard D. Pethia (CERT/CC, USA) / Forming and Managing a Response Team [Pethia 1990]
    • Peter E. Yee (NASA Ames Research, USA) / The NASA Ames Research Center Computer Network Security Response Team [Yee 1990]
    • Alan Fedeli (IBM, USA) / IBM's Corporate-Wide Approach to Dealing With Harmful Code [Fedeli 1990]
  • Developing the Response Team Network
    • Dennis D. Steinauer (NIST, USA) / The Response Center Network : Developing It and Making It Work [Steinauer 1990]
    • Richard D. Pethia (CERT/CC, USA) / Developing the Response Team Network [Pethia 1990a]
    • Ronald H. Hysert (Canadian System Security Centre, CDN) / Developing the Computer Security Incident Response Network : A Canadian Perspective [Hysert 1990]
    • Christopher C. Harvey (SPAN, FR) / The Development of Response Teams in Europe [Harvey 1990]
  • Building a Constituency
    • J. Paul Holbrook (CERT/CC, USA) / Building a Constituency : The CERT/CC Experience [Holbrook 1990]
    • John W. Mildner (Naval Electronics System Security Engineering Center, USA) / Forming a Constituency [Mildner 1990]
    • Jerry Dalton (AT&T, USA) / Building a Constituency : An Ongoing Process [Dalton 1990]

 Dealing with Threats and Vulnerabilities:

  • Trends/Anticipated Future Trends
    • Karl Levitt (UC Davies, USA) / Modeling Attacks on Computer Systems : Evaluating Vulnerabilities and Forming a Basis for Intrusion Detection
    • Donn B. Parker (SRI, USA) / The Trojan Horse Virus and Other Crimoids
    • Jerry M. Carlin (Pacific Bell, USA) / Future Imperfect or Some Thoughts on Future Security Incident Handling
  • Threat Models
    • John Cordani (Adelphi University, USA) / Threat Models : Progress and Problems in Stochastic Models on Internet Vulnerabilities to Self-Replicating Code
    • Dave Icove ; Tim Huff (FBI, USA) / Project CASIAT : Computer Assisted Security and Investigative Analysis Tool
  • Vendor Activities
  • Tools
    • Matt Bishop (Darthmouth College, USA) / Password Checking Techniques
    • Dan Farmer (CERT/CC, USA) / Cops : A UNI*X Security Package
    • Thomas R. Malarkey (NCSC, USA) / Dockmaster Security Enhancements

 Communications:

  • Trusted Communications Mechanisms
    • Rick Carr (NASA, USA) / Lessons Learned from Managing Computer Emergency Response Teams [Carr 1990]
    • Stephen D. Crocker (TIS, USA) / The Role of Trusted Communications in Managing Computer Security
    • Doug Price (Sparta, USA) / Vulnerabilities in the Communication Path : The Hacker is Listening
  • Communicating Vulnerability Information
    • Gregory J. Stuk (Bellcore, USA) / Bellcore Security Information Exchange
    • Keith Bostic (UC Berkeley, USA) / Communicating Vulnerabilities in Open Environments
    • David S. Brown ; Tom Longstaff (CIAC, USA) / Communicating Vulnerabilities
  • Information Sources
    • Kenneth van Wyk (CERT/CC, USA) / Public-Anti-Virus/Security Resources
    • Marianne Swanson (NIST, USA) / Computer Security Resource Center : A Coordinated Approach
    • Thomas R. Malarkey (NCSC, USA) / National Computer Security Center
  • Intra-CERT Communication
    • Joseph P. Boyd (DCA, USA) / Computer Incident Handling Within the Defense Data Network (DDN) [Boyd 1990]
    • Doug L. Mansur (LLNL, USA) / Cooperation in Handling Classified Systems and Information : Report on Initial Meeting [Mansur 1990]
    • Ronald Tencati (SPAN, USA) / Intra-CERT Communications

© 1998-2001 by Klaus-Peter Kossakowski, Germany.