2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07) 2007
DOI: 10.1109/hicss.2007.128
|View full text |Cite
|
Sign up to set email alerts
|

Collaboration Engineering For Incident Response Planning: Process Development and Validation

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 7 publications
(10 reference statements)
0
8
0
Order By: Relevance
“…According to Swimlane, 80% to 90 %of all security operations of an incident response can be automated to some extent [117]. The collaborative incident response planning process design discussed in [45] helps practitioners to come up with the repeatable and executable planning process. Some vendors provided a platform that also automates the deployment of security functions through a network infrastructure [29].…”
Section: Orchestrate Security Activitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Swimlane, 80% to 90 %of all security operations of an incident response can be automated to some extent [117]. The collaborative incident response planning process design discussed in [45] helps practitioners to come up with the repeatable and executable planning process. Some vendors provided a platform that also automates the deployment of security functions through a network infrastructure [29].…”
Section: Orchestrate Security Activitiesmentioning
confidence: 99%
“…One of the major challenges in an organizational security is lack of a fully developed framework for conducting IRP [45], performing coordination and collaboration among incident response [61], seamless implementation and deployment of policies [17]. Some of the challenges mentioned in the reviewed papers include failure to provide clear definition of unwanted traffic and network behaviour [49], significant difficulties in providing clear guidelines to deal with new security mechanisms [31,68,73], failure in providing appropriate training for security management [77], lack of guidelines for conducting incident response planning [45] and severe challenges in enforcing and managing security policies. All these types of challenges result in security staff failing in taking a proactive decision against cybersecurity attacks.…”
Section: Lack Of Regulation and Policy Frameworkmentioning
confidence: 99%
“…Action research also enables testing artifacts by applying them in real-life settings [2], [15], [22]; hence the ColCuRP was tested in four HEIs environments. Action research has also been successfully used in other similar CE studies [1], [12], [16], [17].…”
Section: Research Approachmentioning
confidence: 99%
“…Secondly, action research allowed us to test the collaboration process by applying it in a real life setting. Moreover, it has been successfully used in other similar research studies [16,17,15].…”
Section: Research Approachmentioning
confidence: 99%