Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Audrey J. Dorofee is active.

Publication


Featured researches published by Audrey J. Dorofee.


ieee symposium on security and privacy | 2014

Computer Security Incident Response Team Development and Evolution

Robin Ruefle; Audrey J. Dorofee; David A. Mundie; Allen D. Householder; Michael Murray; Samuel J. Perl

When computer security incidents occur, its critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs. Organized incident management requires defined, repeatable processes and the ability to learn from incidents that threaten the confidentiality, availability, and integrity of critical systems and data. Some organizations assign responsibility for incident management to a defined group of people or a designated unit, such as a computer security incident response team. This article looks at the development, purpose, and evolution of such specialized teams; the evolving nature of attacks they must deal with; and methods to evaluate the performance of such teams as well as the emergence of information sharing as a core service.


hawaii international conference on system sciences | 2011

A Systemic Approach for Assessing Software Supply-Chain Risk

Christopher J. Alberts; Audrey J. Dorofee; Rita Creel; Robert J. Ellison; Carol Woody

In todays business environment, multiple organizations must routinely work together in software supply chains when acquiring, developing, operating, and maintaining software products. The programmatic and product complexity inherent in software supply chains increases the risk that defects, vulnerabilities, and malicious code will be inserted into a delivered software product. As a result, effective risk management is essential for establishing and maintaining software supply-chain assurance over time. The Software Engineering Institute (SEI) is developing a systemic approach for assessing and managing software supply-chain risks. This paper highlights the basic approach being implemented by SEI researchers and provides a summary of the status of this work.


Archive | 2004

Managing Information Security Risks across the Enterprise

Audrey J. Dorofee

There are many ways to approach information security. This chapter looks at information security from a risk management point of view by focusing on the evaluation of information security risks. The evaluation looks at information-related assets that are critical to the success and survivability of an enterprise. By looking at these critical assets, determining how they are at risk, and developing mitigation plans and protection strategies, the enterprise can take a strategic approach to securing vital information. Taking a broad look at all types of threats, enterprises can spend their limited resources wisely, without falling down the rat hole of a technology-centric solution.


Archive | 1996

Continuous risk management guidebook

Audrey J. Dorofee; Julie A. Walker; Christopher J. Alberts; Ronald P. Higuera; Richard L. Murphy


Archive | 2003

Introduction to the OCTAVE ® Approach

Christopher J. Alberts; Audrey J. Dorofee; James Stevens; Carol Woody


Archive | 2003

Managing Information Security Risks

Christopher J. Alberts; Audrey J. Dorofee


IEEE Software | 1997

Putting risk management into practice

Raymond C. Williams; Julie A. Walker; Audrey J. Dorofee


Archive | 2004

Defining Incident Management Processes for CSIRTs: A Work in Progress

Christopher J. Alberts; Audrey J. Dorofee; Georgia Killcrece; Robin M. Ruefle; Mark T. Zajicek


Archive | 2010

Risk Management Framework

Christopher J. Alberts; Audrey J. Dorofee


Archive | 1994

Team Risk Management: A New Model for Customer-Supplier Relationships

Ronald P. Higuera; Audrey J. Dorofee; Julie A. Walker; Ray C. Williams

Collaboration


Dive into the Audrey J. Dorofee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Carol Woody

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Robin M. Ruefle

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

David P. Gluch

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Julia H. Allen

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Ray C. Williams

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

David A. Mundie

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Rita Creel

Software Engineering Institute

View shared research outputs
Top Co-Authors

Avatar

Robert J. Ellison

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Robin Ruefle

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge