바로가기

모두를 위한 열린 강좌 KOCW

주메뉴

  • 주제분류
    공학 >컴퓨터ㆍ통신 >정보통신공학
  • 강의학기
    2011년 2학기
  • 조회수
    3,663
  •  
This course is designed to introduce overall incident response procedure, including concepts, forming team, related software and hardware, and detailed log analysis technique.

차시별 강의

PDF VIDEO SWF AUDIO DOC AX
1. 문서 Incident response introduction An introduction to Incident Response URL
2. 문서 Risk Analysis About risk analysis, Types of security-related risks, Obtaining data about security-related incidents, Importance of risk analysis in incident response URL
3. 문서 Computer Security Incident Response Teams (CSIRTs) Basic issue, Incident handling service, Team operation URL
4. 문서 A methodology for Incident Response Rationale for using an incident response methodology, A six-stage methodology for incident response, Caveats URL
5. 문서 RFC 3227 and RFC 2350 Guidelines for evidence collection and archiving, Exceptions for computer security incident response URL
6. 문서 Forming and Managing an incident response team Incident response team, Issues in forming a response team, About managing an incident response effort URL
7. 문서 Organizing for incident response Virtual teams-eusuring availability, Training the team, Testing the team, Barriers to success, External coordination, Managing incidents URL
8. 문서 Tracing Network Attacks Tracing Network Attacks, Putting attack tracing in context, Tracing methods, Constructing an attack path, Final caveats URL
9. 문서 Legal Issues U.S. Computer crime statutes, International statutues, Search, Seizure and monitoring, Policies, Liability URL
10. 문서 Forensics Ⅰ Guiding principles, Forensics hardware, Forensics software, Acquiring evidence, Examination of the evidence URL
11. 문서 Forensics Ⅱ Covert searches, Advanced searches, Encryption, Home use systems, UNIX and server forensics URL

연관 자료

loading..

사용자 의견

강의 평가를 위해서는 로그인 해주세요. 로그인팝업

이용방법

  • 강의 이용시 필요한 프로그램 [바로가기]

    ※ 강의별로 교수님의 사정에 따라 전체 차시 중 일부 차시만 공개되는 경우가 있으니 양해 부탁드립니다.

이용조건