Best Practices in Computer Network Defense: Incident Detection and Response

Share
Editor
Hathaway, M.
Pub. date
February 2014
Pages
160
Binding
softcover
Volume
35 of NATO Science for Peace and Security Series - D: Information and Communication Security
ISBN print
978-1-61499-371-1
ISBN online
978-1-61499-372-8
Subject
Computer & Communication Sciences, Computer Security
 
This book contains a subject index
€108 / US$157 / £92 Excl. VAT
Order Best Practices in Computer Network Defense: Incident Detection and Response ISBN @ €108.00
Order Ebook

"The book identifies the state-of-the-art  tools and processes being used for cyber defense and highlights gaps in the technology. It presents the best practice of industry and government for incident detection and reponse and examines indicators and metrics for progress along the security continuum."
- Belfer Center  (Harvard Kennedy School)


The cyber security of vital infrastructure and services has become a major concern for countries worldwide. The members of NATO are no exception, and they share a responsibility to help the global community to strengthen its cyber defenses against malicious cyber activity.


This book presents 10 papers and 21 specific findings from the NATO Advanced Research Workshop (ARW) ‘Best Practices in Computer Network Defense (CND): Incident Detection and Response, held in Geneva, Switzerland, in September 2013. The workshop was attended by a multi-disciplinary team of experts from 16 countries and three international institutions. The book identifies the state-of-the-art tools and processes being used for cyber defense and highlights gaps in the technology. It presents the best practice of industry and government for incident detection and response and examines indicators and metrics for progress along the security continuum. This book provides those operators and decision makers whose work it is to strengthen the cyber defenses of the global community with genuine tools and expert advice. Keeping pace and deploying advanced process or technology is only possible when you know what is available. This book shows what is possible and available today for computer network defense and for incident detection and response.