2001
DOI: 10.17487/rfc3067
|View full text |Cite
|
Sign up to set email alerts
|

TERENA'S Incident Object Description and Exchange Format Requirements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2003
2003
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 0 publications
0
5
0
1
Order By: Relevance
“…This, off course, implies a secure channel and a protocol for the communication. Today, cfengine offers a framework for the communication, and there is also research going on to define a standard format for intrusion detection (Intrusion Detection Message Exchange Format -IDMEF) [7].…”
Section: Discussionmentioning
confidence: 99%
“…This, off course, implies a secure channel and a protocol for the communication. Today, cfengine offers a framework for the communication, and there is also research going on to define a standard format for intrusion detection (Intrusion Detection Message Exchange Format -IDMEF) [7].…”
Section: Discussionmentioning
confidence: 99%
“…• eCIRT.net Incident Taxonomy (Stikvoort et al, 2015): supersedes the older taxonomy classification by Arvidsson, Cormack, Demchenko and Meijer (2001) and defines incident taxonomy via 11 main classifications (with sub-classifications) and guides teams towards configuration of information Teams (FIRST) protocol that provides an intuitive schema for indicating when and how sensitive information is shared, facilitating effective collaboration (FIRST, 2016). E-mail subjects and document headers/footers must be labelled as follows when shared between entities:…”
Section: Incident Management Standards Maturity Standardsmentioning
confidence: 99%
“…Per [RFC3067], an attack is "an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. "…”
Section: Threats and Attacksmentioning
confidence: 99%