Resources
Sysinternals utilities help you manage, troubleshoot and diagnose Windows systems and applications.
Security configuration and management utilities, including rootkit and spyware hunting programs.
http://technet.microsoft.com/en-gb/sysinternals/default.aspx
Handbook for Computer Security Incident Response Teams (CSIRTs)
Provides guidance on forming and operating a computer security incident response team (CSIRT). In particular, it helps an organization to define and document the nature and scope of a computer security incident handling service, which is the core service of a CSIRT.
http://www.cert.org/archive/pdf/csirt-handbook.pdf
A Step-By-Step Approach On How To Set Up A CSIRT
The document at hand describes the process of setting up a Computer Security and Incident Response Team (CSIRT) from all relevant perspectives like business management, process management and technical perspective.
http://www.enisa.europa.eu/cert_guide/downloads/CSIRT_setting_up_guide_ENISA.pdf
CERT-in-a-Box
The project 'CERT-in-a-Box' and 'Alerting service-in-a-Box' is an initiative of GOVCERT.NL to preserve the lessons learned from setting up GOVCERT.NL and 'De Waarschuwingsdienst', the Dutch national Alerting service. The project aim is to help others starting a CSIRT or Alerting Service by: Getting them up to speed faster and taking the benefits and not making the same mistakes
http://www.govcert.nl/render.html?it=69
JUNOS Router Security – Best Common Practices for Hardening the Infrastructure
Assisting in securing the router infrastructure techniques discussed in this paper are applicable to protecting hosts as well as routers, specific approaches in this paper focus on router security.
http://www.juniper.net/solutions/literature/app_note/350013.pdf
Securing Service Provider Networks – Protecting Infrastructure & Managing Customer Security
Service providers need to deploy equipment that can provide the advanced protections they need. Key among them are line rate packet filtering capabilities and the ability to dynamically augment and propagate packet filters during a debilitating attack.
http://www.juniper.net/solutions/literature/white_papers/200180.pdf
NIST – Computer Security Incident Handling Guide
Mitigate the risks from computer security incidents by providing practical guidelines on responding to incidents effectively and efficiently.
http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf


