Audrey J. Dorofee
Carnegie Mellon University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Audrey J. Dorofee.
ieee symposium on security and privacy | 2014
Robin Ruefle; Audrey J. Dorofee; David A. Mundie; Allen D. Householder; Michael Murray; Samuel J. Perl
When computer security incidents occur, its critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs. Organized incident management requires defined, repeatable processes and the ability to learn from incidents that threaten the confidentiality, availability, and integrity of critical systems and data. Some organizations assign responsibility for incident management to a defined group of people or a designated unit, such as a computer security incident response team. This article looks at the development, purpose, and evolution of such specialized teams; the evolving nature of attacks they must deal with; and methods to evaluate the performance of such teams as well as the emergence of information sharing as a core service.
hawaii international conference on system sciences | 2011
Christopher J. Alberts; Audrey J. Dorofee; Rita Creel; Robert J. Ellison; Carol Woody
In todays business environment, multiple organizations must routinely work together in software supply chains when acquiring, developing, operating, and maintaining software products. The programmatic and product complexity inherent in software supply chains increases the risk that defects, vulnerabilities, and malicious code will be inserted into a delivered software product. As a result, effective risk management is essential for establishing and maintaining software supply-chain assurance over time. The Software Engineering Institute (SEI) is developing a systemic approach for assessing and managing software supply-chain risks. This paper highlights the basic approach being implemented by SEI researchers and provides a summary of the status of this work.
Archive | 2004
Audrey J. Dorofee
There are many ways to approach information security. This chapter looks at information security from a risk management point of view by focusing on the evaluation of information security risks. The evaluation looks at information-related assets that are critical to the success and survivability of an enterprise. By looking at these critical assets, determining how they are at risk, and developing mitigation plans and protection strategies, the enterprise can take a strategic approach to securing vital information. Taking a broad look at all types of threats, enterprises can spend their limited resources wisely, without falling down the rat hole of a technology-centric solution.
Archive | 1996
Audrey J. Dorofee; Julie A. Walker; Christopher J. Alberts; Ronald P. Higuera; Richard L. Murphy
Archive | 2003
Christopher J. Alberts; Audrey J. Dorofee; James Stevens; Carol Woody
Archive | 2003
Christopher J. Alberts; Audrey J. Dorofee
IEEE Software | 1997
Raymond C. Williams; Julie A. Walker; Audrey J. Dorofee
Archive | 2004
Christopher J. Alberts; Audrey J. Dorofee; Georgia Killcrece; Robin M. Ruefle; Mark T. Zajicek
Archive | 2010
Christopher J. Alberts; Audrey J. Dorofee
Archive | 1994
Ronald P. Higuera; Audrey J. Dorofee; Julie A. Walker; Ray C. Williams