Best Practices in Computer Network Defense: Incident Detection and Response

NATO Science for Peace and Security Series - D: Information and Communication Security
2014, Melissa E. Hathaway (Ed.)

The authors decided unanimously to make their work freely accessible. This decision is backed by NATO.
Publishing of the material and requiring any form of authentication, identification or other conditions to be fulfilled before providing the original files is not permitted.

Open Access by chapter:

  1. Advanced Research Workshop Findings
    Melissa Hathaway
    http://belfercenter.ksg.harvard.edu/files/hathaway-findings-chapter.pdf
  2. Computer Network Defense: New Threats and Trends
    Andrea Rigoni and Gustav Lindstrom
    http://www.gcsp.ch/Media/Files/Computer-Network-Defense-New-Threats-and-Trends
  3. Advanced Technologies/Tactics Techniques, Procedures: Closing the Attack Window, and Thresholds for Reporting and Containment
    John Stewart
    http://www.cisco.com/web/about/security/intelligence/JNS_TTPs.pdf
  4. Beyond Perimeter Defense: Defense-in-Depth Leveraging Upstream Security
    Dave McMahon
    https://docs.google.com/file/d/0B4_SBxiVQGUOTV9QVVZ6aktLT0E/edit?pli=1
  5. Back to Basics: Beyond Network Hygiene
    Felix FX Lindner and Sandro Gaycken
    http://recurity-labs.com/content/pub/Lindner_Gaycken-Back-to-Basics.pdf
  6. Aligning National Cyber Security Strategies to International Guidance: A First Step Toward Improving Incident Response Capabilities Across NATO
    Matt Holt
    http://www.intelliumgroup.com/images/news/nato-geneva-Holt-paper.pdf
  7. Evolution of National and Corporate CERTs - Trust, the Key Factor
    Olaf Kruidhof
    http://www.nl.capgemini.com/sites/default/files/resource/pdf/olaf_kruidhof_-_evolution_of_national_and_corporate_certs.pdf
  8. Standards for Cyber Security
    Steve Purser
    https://www.enisa.europa.eu/publications/articles/standards-for-cyber-security
  9. A Model for Positive Change: Influencing Positive Change in Cyber Security Strategy, Human Factor, and Leadership
    Will Pelgrin
    http://www.cisecurity.org/documents/Pelgrin2014chapter.pdf
  10. Coordination and Cooperation in Cyber Network Defense: The Dutch Efforts to Prevent and Respond
    Elly van den Heuvel and Gerben Klein Baltink
    https://www.ncsc.nl/binaries/en/current-topics/news/best-practices-in-computer-network-defense/1/Coordination%2Band%2Bcooperation%2Bin%2Bcyber%2Bnetwork%2Bdefense.pdf