Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. Werlinger, R., Muldner, K., Hawkey, K., & Beznosov, K. In HAISA, pages 119–134, 2009.
Towards Understanding Diagnostic Work During the Detection and Investigation of Security Incidents. [link]Paper  abstract   bibtex   
This study investigates how security practitioners perform diagnostic work during the identification of security incidents. Based on empirical data from 16 interviews with security practitioners, we identify the tasks, skills, strategies and tools that security practitioners use to diagnose security incidents. Our analysis shows that diagnosis is a highly collaborative activity, which may involve practitioners developing their own tools to perform specific tasks. Our results also show that diagnosis during incident response is complicated by practitioners’ need to rely on tacit knowledge, as well as usability issues with security tools. We offer recommendations to improve technology that supports the diagnosis of security incidents.
@InProceedings{werlinger2009towards,
  author     = {Werlinger, Rodrigo and Muldner, Kasia and Hawkey, Kirstie and Beznosov, Konstantin},
  booktitle  = {HAISA},
  title      = {{T}owards {U}nderstanding {D}iagnostic {W}ork {D}uring the {D}etection and {I}nvestigation of {S}ecurity {I}ncidents.},
  year       = {2009},
  pages      = {119--134},
  abstract   = {This study investigates how security practitioners perform diagnostic work during the identification of security incidents. Based on empirical data from 16 interviews with security practitioners, we identify the tasks, skills, strategies and tools that security practitioners use to diagnose security incidents. Our analysis shows that diagnosis is a highly collaborative activity, which may involve practitioners developing their own tools to perform specific tasks. Our results also show that diagnosis during incident response is complicated by practitioners’ need to rely on tacit knowledge, as well as usability issues with security tools. We offer recommendations to improve technology that supports the diagnosis of security incidents.},
  url        = {https://drive.google.com/file/d/1JPsVffj713vbHiLXcaFjqRIgd2zzJtph/view?usp=drive_link},
}

Downloads: 0