<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>01855nam a22001697a 4500</leader>
  <controlfield tag="003">NUST</controlfield>
  <datafield tag="082" ind1=" " ind2=" ">
    <subfield code="a">005.8,SHA</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="a">Shafiq, Hasnain </subfield>
    <subfield code="9">113122</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Analysis of Issues and Challenges in Establishing and Operating CSIRTs in Pakistan /</subfield>
    <subfield code="c">Hasnain Shafiq</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2=" ">
    <subfield code="a">Rawalpindi </subfield>
    <subfield code="b">MCS, NUST </subfield>
    <subfield code="c">2023</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xi, 89 p</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">CSIRT is a group of skilled people who have core knowledge of information security and cyber security incidents. CSIRT team prepares for and responds to the computer security incidents. Almost all organizations take their online security soberly and thus acquire services from CSIRT to control their level of online security. Every CSIRT assists their constituency when a security incident happens and proposes solutions and remediation methodologies to protect them in future. The establishment of CSIRT isn&#x2019;t an easy task to be developed by anyone, the detailed and hard activity requires expert people who specializes in this domain, understand the pros and cons for needed methodologies and processes. This research study describes the establishment of CSIRT and also the issues and challenges that people face while establishing CSIRT. Moreover, the concepts, methodologies, needs and limitations of existing techniques that people of developing countries have experienced are discussed. This research has highlighted CSIRT high level policies, Pakistan&#x2019;s cyber-crime law and presented the results of structured literature review investigating the business requirements for establishing a CSIRT. A survey has been conducted for CSIRT need and importance to achieve and understand the security posture of organizations working in the absence of CSIRT in Pakistan.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
    <subfield code="a">MSIS</subfield>
    <subfield code="9">113123</subfield>
  </datafield>
  <datafield tag="690" ind1=" " ind2=" ">
    <subfield code="a">MSIS-19</subfield>
    <subfield code="9">113124</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="a">Supervisor Dr. Imran Rashid</subfield>
    <subfield code="9">113125</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="2">ddc</subfield>
    <subfield code="c">THE</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">594944</subfield>
    <subfield code="d">594944</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">THE</subfield>
    <subfield code="d">2023-06-13</subfield>
    <subfield code="l">0</subfield>
    <subfield code="o">005.8,SHA</subfield>
    <subfield code="p">MCSTIS-371</subfield>
    <subfield code="r">2023-06-13</subfield>
    <subfield code="w">2023-06-13</subfield>
    <subfield code="y">THE</subfield>
  </datafield>
</record>
