INCH Requirements (2) IETF INCH-WG, March.2003 Glenn M. Keeni/Yuri Demchenko.

Slides:



Advertisements
Similar presentations
The NEW Bloom’s Taxonomy
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
1 Intention of slide set Inform WSMOLX of what is planned for Choreography & Orhestration in DIP CONTENTS Terminology Clarification / what will be described.
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
1 Understanding Web Services Presented By: Woodas Lai.
Managed Incident Lightweight Exchange (MILE) Overview and Participation Kathleen Moriarty Global Lead Security Architect EMC Corporate CTO Office.
EbXML (summary) Sungchul Hong. ebXML ebXML provides a means for companies to integrate their processes easily. Business needs communication. And EDI has.
LMP G parameters draft-dharinigert-ccamp-g lmp-09.txt Gabriele Galimberti Cisco Systems Zafar Ali Cisco Systems Ruediger KunzeDeutsche Telekom.
TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Requirements for Format for INcident data Exchange (FINE) draft-ietf-inch-requirements-00.txt INCH WG, IETF56 March 19, 2003 Yuri Demchenko Glenn Mansfield.
INCH Requirements IETF Interim meeting, Uppsala, Feb.2003.
Some Visualization Principles from Edward Tufte. Edward Tufte, Beautiful Evidence See also
Data Seal of Approval Overview Lightning Talk RDA Plenary 5 – San Diego March 11, 2015 Mary Vardigan University of Michigan Inter-university Consortium.
Automated XML Content Data Exchange and Management draft-waltermire-content-repository-00
Database Planning, Design, and Administration Transparencies
IODEF Design principles and IODEF Data Model Overview IODEF Data Model and XML DTD pre-draft Version 0.03 TERENA IODEF WG Yuri Demchenko.
Network Security Essentials Chapter 1
RUP Implementation and Testing
Incident Object Description and Exchange Format TF-CSIRT at TERENA IODEF Editorial Group Jimmy Arvidsson Andrew Cormack Yuri Demchenko Jan Meijer.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Web Services (SOAP, WSDL, and UDDI)
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Lessons Learned Workshop
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
The Project – Database Design. The following is the high mark band for the Database design: Analysed a given situation and produced and analysed a given.
Incident Object Description and Exchange Format
Refrences: Information Technology Project Management, Sixth Edition(ch#3) Note: See the text itself for full citations.
Current Situation and CI Requirements OOI CyberInfrastructure Science User Requirements Workshop: San Diego January 23-24, 2008.
Do Now Which methods are most important to proving your hypothesis?
IT’S NOT ABOUT THE TOOLS; IT’S ABOUT USING THE TOOLS TO FACILITATE LEARNING. BLOOM’S TAXONOMY.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
Relations between IODEF and IDMEF Based on IDMEF XML DTD and Data Model Analysis TERENA ITDWG IODEF Editorial Group Yuri Demchenko.
EGEE-III INFSO-RI Enabling Grids for E-sciencE EGEE and gLite are registered trademarks David Kelsey RAL/STFC,
Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully.
ITEM #1 reference to retrieval and archiving is removed.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Draft-huston-sidr-rfc6490-bis Geoff Huston Slide 1/6.
Session title: Protection of Smart Utility Grids Group edited strategy.
POST DOCUMENT OVERVIEW POST SAFETY FORUM 10 MARCH 2015.
Control System Design Process Planning Documentation.
Optimising XML Schema for IODEF Data model INCH WG, IETF57 July 16, 2003 Yuri Demchenko.
The original Internationalized Domain Name (IDN) WG set the requirements for international characters in domain names in RFC 3454, RFC3490, RFC3491 and.
Copyright 2006 WiMAX Forum “WiMAX Forum” and "WiMAX Forum CERTIFIED “ are trademarks of the WiMAX Forum. All other trademarks are the properties of their.
1 SIPREC Protocol (draft-portman-siprec-protocol-05) June 28, 2011 IETF 81 Authors: L. Portman, H. Lum, A. Johnston, A. Hutton.
Overview of OASIS SOA Reference Architecture Ken Laskey OASIS SOA-RM RA Subcommittee 19 February 2008 Ken Laskey OASIS SOA-RM RA Subcommittee 19 February.
Relations between IODEF and IDMEF Based on IDMEF XML DTD and Data Model Analysis TERENA ITDWG IODEF Editorial Group Yuri Demchenko.
1 MICE UK meeting at RAL 05 May 2005 Integrated Design & Safety Review Presented by.
INCident Handling BOF (INCH) Thursday, March IETF 53.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Slide 1 STANDARD OPERATING PROCEDURES Judith Marshall Quality Manager Fera.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Stephen Banghart Dave Waltermire
Incident Object Description and Exchange Format
MANAGEMENT OF STATISTICAL PRODUCTION PROCESS METADATA IN ISIS
Establishing and Maintaining Reading and Writing Workshops
INCH Requirements Glenn Mansfield Keeni Cyber Solutions Inc
Agenda+ beepy IETF IETF 56th – March 18, 1993.
Liaison Report to WS-BPEL Technical Committee of Oasis Update
Teaching and Learning with Technology
Web services, WSDL, SOAP and UDDI
editing March 18, 2014 Objectives:
Example Use Case for Attribute Authorities and Token Translation Services - the case for eduGAIN Andrea Biancini.
The ESS reference metadata standards

The new approach to publications in 2011 and beyond
Incident Object Description and Exchange Format
Presentation transcript:

INCH Requirements (2) IETF INCH-WG, March.2003 Glenn M. Keeni/Yuri Demchenko

ISSUES (1) We need an operational model … A simple one ….

Target A document describing the high-level functional requirements of a data format for collaboration between CSIRTs and parties involved…

CSIRT Incident Data Standard Format for Incident Data Operational Model Other CSIRTs Format #!? Format ##!!??

Enable categorization and statistical analysis Ensure integrity, authenticity and privacy Intent of the IR Data Model Enable controlled exchange and sharing between CSIRT and CSIRT

The CSIRT operations – information processing and archiving We do not intend to define The exchange protocol, process The usage, analysis,......

Issues from Uppsala: Primarily generated by humans ? Explain Internationalization: insufficient explanation The IR should carry information whereby its authenticity,.. can be guaranteed ? Explain

TO BE Done Edit and revise