{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T03:28:58Z","timestamp":1773286138210,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335057","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:50:11Z","timestamp":1448319011000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Prerequisites for building a Computer Security Incident Response capability"],"prefix":"10.1109","author":[{"given":"Roderick","family":"Mooi","sequence":"first","affiliation":[]},{"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A step-by-step approach on how to set up a CSIRT","year":"2006","journal-title":"ENISA Tech Rep"},{"key":"ref11","article-title":"State of the practice of computer security incident response teams (CSIRTs)","author":"killcrece","year":"2003","journal-title":"Software Engineering Institute Carnegie Mellon Tech Rep"},{"key":"ref12","article-title":"Good practice guide for incident management","year":"2010","journal-title":"ENISA Tech"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588307"},{"key":"ref14","article-title":"ITIL &#x00AE; Service Design","author":"hunnebeck","year":"2011"},{"key":"ref15","article-title":"Expectations for computer security incident response","author":"brownlee","year":"1998","journal-title":"RFC 2350 (Best Current Practice)"},{"key":"ref16","article-title":"Information technology - Security techniques - Code of practice for information security management","year":"2008","journal-title":"Standards South Africa Standard 27002"},{"key":"ref17","first-page":"800","article-title":"Computer security incident handling guide","author":"cichonski","year":"2012"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.21236\/ADA413778","author":"west-brown","year":"2003","journal-title":"Handbook for Computer Security Incident Response Teams (CSIRTs)"},{"key":"ref19","first-page":"xiii","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"webster","year":"2002","journal-title":"MIS Q"},{"key":"ref4","year":"2015","journal-title":"Welcome to Black Hat USA"},{"key":"ref3","author":"dalziel","year":"0","journal-title":"Information security conferences of 2015"},{"key":"ref6","year":"2015","journal-title":"Preparing for warfare in cyberspace"},{"key":"ref5","author":"ranger","year":"2014","journal-title":"Inside the secret digital arms race Facing the threat of global cyberwar"},{"key":"ref8","article-title":"Organizational models for computer security incident response teams (CSIRTs)","author":"killcrece","year":"2003","journal-title":"Software Engineering Institute Carnegie Mellon Tech Rep"},{"key":"ref7","article-title":"Information technology - Security techniques - Information security management systems - Overview and vocabulary","year":"2009","journal-title":"Standards South Africa Standard 27002"},{"key":"ref2","author":"donohoe","year":"2015","journal-title":"VMware fixes Java information disclosure vulnerability"},{"key":"ref1","author":"goodin","year":"2015","journal-title":"Just-released WordPress 0day makes it easy to hijack millions of websites [updated]"},{"key":"ref9","article-title":"Defining incident management processes for CSIRTs: A work in progress","author":"alberts","year":"2004","journal-title":"Carnegie Mellon University Tech Rep"},{"key":"ref20","first-page":"1","article-title":"Forming an Incident Response Team","author":"smith","year":"1994","journal-title":"Proc First Ann Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33332-3_20"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","location":"Johannesburg, South Africa","start":{"date-parts":[[2015,8,12]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335057.pdf?arnumber=7335057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T20:53:46Z","timestamp":1567371226000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335057","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}