Computer Incident Advisory Capability

Last updated

Computer Incident Advisory Capability (CIAC) was the original computer security incident response team at the United States Department of Energy. CIAC was formed in February 1989, and jointly sponsored by the DOE Office of the CIO and the Air Force. The primary function of CIAC was, as the name implies, to advise people of computer incidents. Primarily, this means security vulnerabilities, virus and hoax alerts and similar information security concerns. CIAC was a founding member of GFIRST, the Government Forum of Incident Response and Security Teams and FIRST, an international incident response and security organization. CIAC published incident reports and bulletins up until it was officially renamed to DOE-CIRC and relocated to Las Vegas, Nevada in October 2008. [1]

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">Los Alamos National Laboratory</span> Laboratory near Santa Fe, New Mexico

Los Alamos National Laboratory is one of the sixteen research and development laboratories of the United States Department of Energy (DOE), located a short distance northwest of Santa Fe, New Mexico, in the American southwest. Best known for its central role in helping develop the first atomic bomb, LANL is one of the world's largest and most advanced scientific institutions.

A tiger team is a team of specialists assembled to work on a specific goal or to solve a particular problem.

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA). Specifically, US-CERT is a branch of the Office of Cybersecurity and Communications' (CS&C) National Cybersecurity and Communications Integration Center (NCCIC).

A computer emergency response team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include cyber emergency response team, computer emergency readiness team, and computer security incident response team (CSIRT). A more modern representation of the CSIRT acronym is Cyber Security Incident Response Team.

ARCV-n is a large family of viruses authored by the Association of Really Cruel Viruses (ARCV) group through October - November 1992. and polymorphed with the PS-MPC virus generation tool. A polymorphic virus mutates itself to avoid detection by traditional antivirus and antimalware software. ARCV-n viruses seem to infect COM and/or EXE files rapidly, but do not damage the compromised machine, instead displaying various text messages to the user. An infected file will have the ARCV-n virus appended to the end of it.

An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Incident management (IcM) is a term describing the activities of an organization to identify, analyze, and correct hazards to prevent a future re-occurrence. These incidents within a structured organization are normally dealt with by either an incident response team (IRT), an incident management team (IMT), or Incident Command System (ICS). Without effective incident management, an incident can disrupt business operations, information security, IT systems, employees, customers, or other vital business functions.

<span class="mw-page-title-main">Nuclear Emergency Support Team</span> US federal government organization

The Nuclear Emergency Support Team (NEST), formerly known as the Nuclear Emergency Search Team is a team of scientists, technicians, and engineers operating under the United States Department of Energy's National Nuclear Security Administration (DOE/NNSA). NEST is the umbrella designation that encompasses all DOE/NNSA radiological and nuclear emergency response functions; some of which date back more than 60 years. NEST's responsibilities include both national security missions, particularly; countering weapons of mass destruction (WMD) and public health and safety, including responses to nuclear reactor accidents. NEST's task is to be 'prepared to respond immediately to any type of radiological accident or incident anywhere in the world'.

<span class="mw-page-title-main">U.S. critical infrastructure protection</span>

In the U.S., critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or the nation. The American Presidential directive PDD-63 of May 1998 set up a national program of "Critical Infrastructure Protection". In 2014 the NIST Cybersecurity Framework was published after further presidential directives.

A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The CISO is also usually responsible for information-related compliance. The CISO is also responsible for protecting proprietary information and assets of the company, including the data of clients and consumers. CISO works with other executives to make sure the company is growing in a responsible and ethical manner.

CIAC may refer to:

In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.

The EINSTEIN System is an network intrusion detection and prevention system that monitors the networks of US federal government departments and agencies. The system is developed and managed by the Cybersecurity and Infrastructure Security Agency in the United States Department of Homeland Security (DHS).

Presidential Decision Directive 62 (PDD-62), titled Combating Terrorism, was a Presidential Decision Directive (PDD), signed on May 22, 1998 by President Bill Clinton. It identified the fight against terrorism a top national security priority.

The National Nuclear Security Administration (NNSA) is a United States federal agency responsible for safeguarding national security through the military application of nuclear science. NNSA maintains and enhances the safety, security, and effectiveness of the U.S. nuclear weapons stockpile; works to reduce the global danger from weapons of mass destruction; provides the United States Navy with safe and effective nuclear propulsion; and responds to nuclear and radiological emergencies in the United States and abroad.

GFIRST is the United States Government Forum of Incident Response and Security Teams.

Software that is used for designing factorial experiments plays an important role in scientific experiments and represents a route to the implementation of design of experiments procedures that derive from statistical and combinatorial theory. In principle, easy-to-use design of experiments (DOE) software should be available to all experimenters to foster use of DOE.

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).

RESTENA is the high-speed network for the education and research community of the Grand Duchy of Luxembourg. The network has been operational since 1989 and connected to the global Internet since 1992.

Eugene Schultz was an American computer security researcher and expert on cybersecurity.

References

  1. DOE Computer Incident Response Capability Archived 2009-06-11 at the Wayback Machine