CSCI E-170 Reading

Lecture 08: Protecting Infrastructure & Incident Response

 

required reading:

 

RFCs

 

Other documents


optional reading:
 

Documents that may be of interest

·          Sabotage Reporting

·          Critical Cyber Asset Identification

·          Security Management Controls

·          Personnel & Training

·          Electronic Security Perimeter(s)

·          Physical Security of Critical Cyber Assets

·          Systems Security Management

·          Incident Reporting and Response Planning

·          Recovery Plans for Critical Cyber Assets