Recommendations of the National Institute of Standards and Technology
Paul Cichonski Tom Millar Tim Grance Karen Scarfone
Special Publication 800-61
Revision 2
karenw
Typewritten Text
http://dx.doi.org/10.6028/NIST.SP.800-61r2
NIST Special Publication 800-61
Revision 2
Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD
Tom Millar
United States Computer Emergency Readiness Team
National Cyber Security Division
Department of Homeland Security
Tim Grance
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD
Karen Scarfone
Scarfone Cybersecurity
C O M P U T E R S E C U R I T Y
August 2012
U.S. Department of Commerce
Rebecca Blank, Acting Secretary
National Institute of Standards and Technology
Patrick D. Gallagher,
Under Secretary of Commerce for Standards and Technology
and Director
karenw
Typewritten Text
http://dx.doi.org/10.6028/NIST.SP.800-61r2
COMPUTER SECURITY INCIDENT HANDLING GUIDE
ii
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nations
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analyses to advance the development and productive use of
information technology. ITLs responsibilities include the development of management, administrative,
technical, and physical standards and guidelines for the cost-effective security and privacy of other than
national security-related information in Federal information systems. The Special Publication 800-series
reports on ITLs research, guidelines, and outreach efforts in information system security, and its
collaborative activities with industry, government, and academic organizations.After reading the article by Martini and Choo listed under the readings for this week, write a short paper describing the challenges facing forensic practitioners in the identification of service providers and accounts, including usernames and passwords as a protection of privacy/ Use the Sullivan Online Library, Google Scholar, or other Internet resources to identify at least one research paper or trade journal article that addresses these challenges and use it to support your position/
Your paper should be written in no less than 500 words and no more than about 1,000 words/ Use proper APA formatting/ The paper should include an abstract, introduction, discussion, and conclusion/ You are welcome to include any other sources (online and in the literature) as long as it is academically suitable for this type of work/ You are graded on content, grammar, spelling, format, and timeliness of your submission/ (Due NLT November 3, 2019 6:30PM EST)
Recent Comments