<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Building a security team in academia: proposal of a new concept1</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Martin Havránek</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Václav Lohr</string-name>
          <email>lohr@pef.czu.cz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavel Ambruz</string-name>
          <email>ambruzp@pef.czu.cz</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Martin Lukáš</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Miloš</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Czech University of Life Sciences Prague, Faculty of Economics and Management</institution>
          ,
          <addr-line>Kamýcká 129, 16500 Praha -Suchdol</addr-line>
        </aff>
      </contrib-group>
      <fpage>149</fpage>
      <lpage>160</lpage>
      <abstract>
        <p>In this idea paper we provide a comprehensive overview of the role computer security incident response team (CSIRT) and analyse the challenges of building a CSIRT in the academic environment. We describe an academic CSIRT schema of operation, propose its operations and risk assessment template, and discuss key threats to tackle, catalog of services, knowledge base and incident handling. The proposed CSIRT concept is tailored specifically to university environment and will be verified at a selected university.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;CSIRT</kwd>
        <kwd>university</kwd>
        <kwd>threat</kwd>
        <kwd>risk assessment</kwd>
        <kwd>knowledge base</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        including legacy systems that may be more vulnerable. And finally - given the evolving
regulatory landscape, it will soon be necessary to implement measures in compliance [
        <xref ref-type="bibr" rid="ref23">24</xref>
        ]
with the NIS2 directive [
        <xref ref-type="bibr" rid="ref24">25</xref>
        ] - by October 17, 2024. [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]
      </p>
      <p>
        Although a computer security incident response team (CSIRT) should be a common
practice in all types of organisations, there are only 56 teams in research and education
organisations out of 581 CSIRT in the EU [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Yet, the high initial and operating costs of
maintaining a CSIRT, lack of qualified staff and generally low awareness of cybersecurity
threats are root causes of the current state. “Cross-CSIRT organisations have played a key
role in facilitating exchanges and collaboration among national CSIRTs and the wider CSIRT
and cyber security communities, around the world and within some geographic regions.” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
      </p>
      <p>The aim of this paper is to propose a new concept for building a security team in an
academic environment. We want to outline strategies to effectively protect sensitive data and
information systems without compromising academic freedom and creativity. We will also
address the specific challenges academic institutions face in the area of cybersecurity taking
into account the unique needs and dynamics of educational institutions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>2.1. Current state of the art</title>
        <p>
          CSIRT represents a specialized team of experts whose primary responsibility is to respond to
cyber incidents, including but not limited to DDoS attacks, malware, data breaches, misuse, or
the outage of entire infrastructures [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. CSIRT may have variable utility despite its clearly
defined goal, as the protected infrastructure is not always perceived as critical [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. In this
regard, the structure of the CSIRT team can be divided into several levels, specifically
university, corporate or business, and government teams [
          <xref ref-type="bibr" rid="ref25">26</xref>
          ]. As implied by the respective
designations, each of these has its specifics, which may vary, although they share the same goal [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>The fundamental differences among the individual teams lie in their purpose, authorities,
and, of course, finances. It is not possible to unequivocally determine which team is the best,
as each has its own specifics. For example, a governmental CSIRT will primarily focus on
protecting critical elements of the state, whereas a university team will primarily
concentrate on safeguarding research databases and, generally, school infrastructure. A
corporate CSIRT, on the other hand, will unequivocally endeavor to protect its infrastructure and
ensure the continuous operation of its business [7].</p>
        <p>
          CESNET CSIRT provides cyber security for academic and research institutions in the
Czech Republic. Its main tasks include monitoring network traffic, detection and rapid
response to security incidents, implementation of preventive measures, provision of expert
advice and support, organisation of training and educational events, cooperation with
national and international security organisations, processing of incident reports and
research in the field of cyber security. However, little is known in the literature about how
to build academic CSIRT and how to align them with the national and international
structures of CSIRT [
          <xref ref-type="bibr" rid="ref7">8</xref>
          ].
        </p>
        <p>
          The first essential step is to conduct a feasibility study to determine whether the
establishment of a CSIRT team is truly necessary. This study must encompass all key aspects
associated with project implementation, including a clear answer to the question of whether a
CSIRT team is needed. Regardless of the team's level, it is crucial to clearly define its goals,
responsibilities, and workflow. These criteria are pivotal for designing an appropriate CSIRT
team structure and preparing all necessary documentation for its establishment.
Unfortunately, despite all these measures, finances remain paramount, as only a sufficiently large
budget can secure all required material and human resources for the project [
          <xref ref-type="bibr" rid="ref8">9</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Review of existing solutions</title>
        <p>This review focused on the unique challenges and characteristics of academic CSIRTs and
compared them to national and enterprise CSIRTs. We reviewed academic articles, official
documents, standards such as RFC 2350, and practical examples of CSIRTs to understand
current trends and best practices.</p>
        <p>The information was organised into sections for each type of CSIRT, detailing their main
tasks and characteristics. National CSIRTs secure critical state infrastructure and cooperate at
the international level. Corporate CSIRTs benefit from better financial support and use
artificial intelligence for decision-making. Academic CSIRTs face funding issues and staff turnover
but emphasise research and publishing.</p>
        <p>We compared the strengths and weaknesses of each type of CSIRT and highlighted the
specific needs of academic teams. We concluded the review with key findings and
recommendations for improving the performance of CSIRTs and provided insights for
further development in cybersecurity with a focus on academic CSIRTs.</p>
        <p>The structure of the CSIRT team that we are examining focuses primarily on three
categories: national, corporate, and academic CSIRT teams. Although these teams are
fundamentally similar, each has a distinct role that makes their existence essential.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.2.1. National CSIRT</title>
        <p>
          National CSIRT teams have several primary missions [
          <xref ref-type="bibr" rid="ref9">10</xref>
          ], including:
        </p>
        <sec id="sec-2-3-1">
          <title>1. Providing security services.</title>
          <p>2. Collaboration with entities within the state.
3. Transnational cooperation with the global CSIRT community.</p>
          <p>
            National CSIRT primarily focuses on the critical infrastructure of the state and strives to
secure key institutions for its proper functioning. Currently, cybersecurity is a significant
topic globally, and every state is actively seeking to engage in measures in this area.
An important factor is that each national CSIRT team adheres to RFC 2350 [
            <xref ref-type="bibr" rid="ref10">11</xref>
            ] to comply
with established standards and to better communicate with others. For example, the Polish
CSIRT team [
            <xref ref-type="bibr" rid="ref11">12</xref>
            ] essentially shares the same goal as all others but has minor deviations in
its definition of critical infrastructure, which is entirely normal as it is not always possible
to defend everything. Therefore, an initial feasibility study of the entire CSIRT team project
is crucial to clearly identify what is considered critical infrastructure and how to protect it.
Another example is the Spanish CSIRT team (Home, n.d.), which also adheres to standards
but has minor deviations in the definition of critical infrastructure. To ensure that the
national CSIRT team is a quality partner in the field of cybersecurity, it is necessary to
adhere to general standards in the construction and purpose of the CSIRT team [
            <xref ref-type="bibr" rid="ref12">13</xref>
            ].
          </p>
        </sec>
      </sec>
      <sec id="sec-2-4">
        <title>2.2.2. Corporate CSIRT</title>
        <p>
          The corporate CSIRT team is usually better financially supported than the national team and
also has sufficient resources and opportunities for the professional development of its
members. The main focus of the corporate team is to ensure the secure operation of the
company and prevent unauthorized access to the internal network. From a cybersecurity
perspective, end-user devices utilized by company employees are the most vulnerable [
          <xref ref-type="bibr" rid="ref13">14</xref>
          ].
        </p>
        <p>
          The corporate team typically has the advantage of not needing to connect with various
public entities and is not required to operate from any specific public location. This simple
rule enables easier monitoring of entry points into the internal network compared to
government or university teams. The key elements of the corporate team include proper
structure, allocation of responsibilities, and prompt responses to cyber incidents. Smaller
units within the team also play an important role, requiring efficient and rapid
communication. The final integral component is the security manager, who decides on the
course of action in resolving the specific cyber incident. It is important to note that
currently, the majority of incidents are addressed automatically, with decision-making
handled by artificial intelligence (UI) [
          <xref ref-type="bibr" rid="ref14">15</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>2.2.3. Academic CSIRT</title>
        <p>
          The university CSIRT is highly specific due to its functionality, as it requires various user
and application approaches, and additionally involves research databases and projects in
general. Universities often face inadequate financial support for this type of project, and they
frequently rely on assistance from public companies or the government. From a certain
perspective, they have an advantage in recruiting team members due to the possibility of involving
students. However, this leads to team instability, and frequent turnover of members may not
guarantee sufficient expertise within the team [
          <xref ref-type="bibr" rid="ref15">16</xref>
          ].
        </p>
        <p>Given the scope of applications, end-user devices, and other server equipment, the
university network is relatively unique and capable of addressing specific cyber incidents.
The university CSIRT primarily focuses on three main areas:</p>
        <sec id="sec-2-5-1">
          <title>1. Identifying end users within the university network.</title>
          <p>2. Investigating cyber incidents.</p>
          <p>3. Publishing results and research from the university CSIRT team.</p>
          <p>
            The university CSIRT team places particular emphasis on research, as the range of security
aspects is the broadest among all types of CSIRT teams [
            <xref ref-type="bibr" rid="ref16">17</xref>
            ].
          </p>
          <p>
            According to [
            <xref ref-type="bibr" rid="ref17">18</xref>
            ] The cybersecurity team of the future will be intrinsically
multidisciplinary, composed of internal and external expertise (consisting of both people and
artificial intelligence) from multiple diverse relevant fields. The people involved will have a
proclivity for combining their deep areas of expertise with others on the team who possess
complementary deep knowledge, abilities, and experiences. Because of cybersecurity’s
interdependencies across core business functions, members of the cybersecurity team will examine
each business process to determine acceptable levels of risk. They will also protect the
organization by ensuring that business solutions, products, and services are designed, developed,
provided, and maintained with full consideration of the latest security risks to the customers.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. A proposal of a university department CSIRT</title>
      <p>In this chapter, we will focus on the process of establishing a CSIRT team and describing its
schema of operation. This study focuses on the creation of a team for a specific part of the
university, such as a department, faculty, etc. This approach differs from the creation of a
CSIRT for the entire university, which views the university as a whole. In this case, the study
is centered on the security of projects conducted within individual parts, which are often
independent of the overall university infrastructure and have a certain degree of autonomy,
including responsibility for security. The main tasks of a CSIRT are: risk identification,
compiling a service catalog, and incident response. Considering the dynamic nature of the
entire process, it is necessary to periodically review threats, vulnerabilities, and new services.</p>
      <p>Based on the research of existing solutions, the following CSIRT schema of operation
(Figure 1) was proposed. Solution is proposed based on previous literature research with
choosing suitable techniques found in materials described in previous chapter.</p>
      <p>After establishing a CSIRT, it is necessary to identify (i) threats and vulnerabilities, (ii)
the service catalog, and (iii) controls identification (protection options for services). These
three factors then feed into the risk assessment. Within this step, (i) risk identification, (ii)
risk estimation, and (iii) risk evaluation are performed.</p>
      <p>In the event of an incident, the first level of support determines whether relevant
measures can be taken using playbooks established in the knowledge base. If the incident
cannot be resolved at the first level of support, it is escalated to specialized second and third-level
teams. The record of the resolution procedure is stored in the knowledge base in case of a
recurring incident. If a new threat is identified, it is necessary to reassess the risks in relation to
the operational service catalog.</p>
      <sec id="sec-3-1">
        <title>3.1. CSIRT establishing</title>
        <p>
          According to [
          <xref ref-type="bibr" rid="ref18">19</xref>
          ] minimal requirements on CSIRT are Information security incident
management (vulnerability management, vulnerability discovery/research, vulnerability
analysis, vulnerability disclosure and vulnerability response), Situational awareness, Knowledge
transfer and Information security event management
        </p>
        <p>There are different roles in CSIRT. Blue and red teams play complementary roles in
ensuring the organization's cybersecurity posture is robust and resilient against threats.</p>
        <p>The blue team's primary focus is on defense and response. They are responsible for
continuous monitoring of network traffic, system logs, and other data to detect potential
security incidents, utilizing tools such as Security Information and Event Management
(SIEM) systems for data aggregation and analysis. When a security incident is detected, the
blue team acts swiftly to contain, eradicate, and recover from it by following predefined
incident response plans and employing forensic tools to investigate breaches. Additionally,
they manage vulnerabilities by regularly scanning systems for weaknesses and ensuring
timely application of patches and updates. The blue team also gathers and analyzes threat
intelligence to stay ahead of emerging threats and proactively defend against them.
Furthermore, they are involved in educating employees on security best practices, phishing
awareness, and other aspects of cybersecurity hygiene.</p>
        <p>The red team focuses on attack and testing. They conduct penetration testing to simulate
attacks on the organization’s systems, networks, and applications to identify vulnerabilities
and weaknesses, using both automated scans and manual testing techniques. This team also
tests the organization’s resilience against social engineering attacks, such as phishing or
pretexting, to identify human vulnerabilities. They perform advanced, targeted attack
simulations, like Advanced Persistent Threat (APT) scenarios, to test the organization’s
detection and response capabilities under realistic conditions. After completing their
assessments, the red team documents their findings and provides detailed reports on
vulnerabilities, attack vectors, and potential impacts, along with recommendations for
improving defenses. Collaboration with the blue team is crucial, as it involves addressing
identified weaknesses, improving incident response plans, and enhancing overall security
measures.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Risk assesment</title>
        <p>Risk assessment can be divided into three areas.</p>
        <p>The first area (User-focused threats) includes attacks targeted at users. These are mainly
social engineering attacks, attacks using computer viruses, and attacks on insufficiently
secured accounts. This category also includes insider threats, where the attacker exploits
access to local network resources. However, this type of attack can also result from an
insufficiently secured or compromised employee account.</p>
        <p>The second area (Application-focused threats) includes attacks focused on application
security and the security of system infrastructure. In practice, these are attacks on operating
systems, hypervisors, web servers, database systems, and the applications themselves.</p>
        <p>The third area (Network-focused threats) covers network infrastructure and network
protocols. Some of these attacks fall within the competence of the Internet Service Provider (ISP).
Other attacks target the vulnerabilities of individual protocols such as DNS, SMTP, IP, etc. In
most universities, the network infrastructure is centrally managed in collaboration with
connectivity providers. Therefore, only significant threats from this area are included here, as
they must be considered, but they cannot be influenced much in terms of the proposed
solution.
Application-focused threats</p>
        <p>Network-focused threats</p>
        <p>Injection flaws DDoS
Broken authentication MitM
Sensitive data exposure Packet Sniffer</p>
        <p>XML external entities IP Spoofing
Security misconfiguration Flood Attack</p>
        <p>XSS DNS Spoofing
Insecure deserialization</p>
        <p>Insufficient logging &amp;</p>
        <p>monitoring
Login credentials Password attack</p>
        <p>Malware Session Hijacking
Insider Threats SSL Hijacking</p>
        <p>Compromised key
Brute Force attack</p>
        <p>Malware</p>
        <p>Database attack</p>
        <p>
          Table 1 was created by selecting relevant threats from [
          <xref ref-type="bibr" rid="ref19">20</xref>
          ], where is full list of threats.
From the original list of threats, only those relevant to the purposes of this study were
identified. Therefore, only threats related to the operation of the subsystem within the
department were selected.
        </p>
        <p>
          Despite the categorization of threats (Table 1), it is important to note that some risks can
be mitigated in multiple ways. For this reason, risk assessments must always be conducted
comprehensively, utilizing all possible defense options. Additionally, some security systems
can conflict with each other. For example, sensitive data exposure or MitM
(Man-in-theMiddle) attacks can be eliminated by implementing encrypted communication. However,
some security systems perform SSL inspection to test communication for malware, which
reduces the security of sensitive data [
          <xref ref-type="bibr" rid="ref21">22</xref>
          ].
        </p>
        <p>The risk assessment will be recorded in a two-dimensional table, with individual threats in
the rows and assets in the columns. The assessment involves three metrics: impact (I), threat
(T), and vulnerability (V). All metrics are defined on a scale from 1 to 4, where 1=low,
2=medium, 3=high, and 4=critical. The risk level is determined by formula R=I x T x V and finally
is evaluated as Low (1-16), Medium (17-31), High (32-47), Critical (48-64). An example of risk
level assessment is provided in Table 2. The values presented in the table are illustrative only.
The actual determination of risk levels will be possible after the analyses are conducted.
Compromised key</p>
        <p>XSS
Spam
Total</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Catalog of services / asset identification</title>
        <p>
          The identification of assets and provided services is crucial for determining the resources that
need protection. It is recommended to start with a minimal, yet precisely specified set of
resources, and then add and expand as necessary [
          <xref ref-type="bibr" rid="ref20">21</xref>
          ]. A common issue is the introduction of
new assets without including them in the risk assessment. Therefore, the proposed solution
includes a periodic review of operated assets followed by a new risk assessment.
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>3.4. Knowledge base</title>
        <p>Knowledge base provides a centralized repository for all the information relevant to
incident response. This includes documentation of past incidents, response procedures,
technical details, threat intelligence, and more. A playbook in the context of a CSIRT and
knowledge base is a set of predefined procedures and actions to be taken in response to specific
types of incidents. Each playbook provides step-by-step guidance on how to handle a
particular scenario.</p>
        <p>Given the expected frequent turnover of CSIRT members from students, it is essential to
ensure effective knowledge transfer. Therefore, the knowledge base is a crucial component of
the proposed solution, and it is necessary to precisely document the resolution of incidents in
the form of a playbook for future use.</p>
      </sec>
      <sec id="sec-3-5">
        <title>3.5. Incident handling</title>
        <p>
          According to [
          <xref ref-type="bibr" rid="ref20">21</xref>
          ], the incident is reported to first-level support staff. At this level, it is
assumed that the incident will be classified and a solution found using the knowledge base.
Support staff will also request more detailed information and look up relevant sources for the
incident. If a solution is not found using the knowledge base and the first-level support staff
cannot resolve it, the incident is escalated to second and third-level support specialists. These
are previously unresolved or complex cases. After the successful investigation of the incident,
the problem record is described in the knowledge base in case the incident recurs. If a new
threat is identified, it is necessary to perform a repeated risk assessment (i.e., it is necessary to
verify the impact of the new threat on the service catalog).
4. Discussion and conclusion
The proposed solution is based on a review of available sources, from which a CSIRT schema
of operation diagram was created. The diagram includes both periodic activities (review of
threats and vulnerabilities) and responses to changes in the operated systems (New service
catalog item). The primary goal of the CSIRT is continuous testing of resilience against cyber
threats and response to incidents. Emphasis is placed on a knowledge base for faster
response to past incidents. Given the expected higher turnover of CSIRT members (students
are only involved during their studies), it is necessary to ensure a sufficiently reliable
knowledge transfer.
        </p>
        <p>Compared to other solutions, the proposed solution is tailored specifically for deployment in
an academic environment. It is primarily focused on preventing attacks on data and the
misuse of research and student projects. Less emphasis is placed on network security, which is
managed by the university's system administration. More emphasis is placed on newly
deployed software systems, which, unlike in a corporate environment, have greater flexibility
during deployment and thus become more frequent targets of attacks.</p>
        <p>A key strength of this study is the compilation of the latest insights for creating a CSIRT. At
the same time, it is tailored to the needs and specifics of the university's department.
Individual departments often have autonomy, within which they can create websites,
computer systems, and projects to support teaching, which are not part of the university's
system and therefore do not fall directly under the control of university-wide security.
However, this also brings the responsibility for the operated systems and their security.
This study can be compared to the relationship between a university and an ISP. An ISP uses
its own security team, just like a university, but the purpose and functioning of each team
differ. Similarly, in this study, the university acts as the ISP, and the departments are the
system operators.</p>
        <p>A potential threat may predominantly lie in the relationship between the university
department's CSIRT and the university's infrastructure. Additionally, greater involvement of
students and internal staff from the department is expected, which will often lead to increased
turnover. Therefore, it is necessary to adhere to the principles of maintaining a knowledge
base for repeated incident resolution.</p>
        <p>We will utilize the proposed CSIRT operation within a selected university. The experience
and collected feedback will be used in a follow up full research paper.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>REFERENCES</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          .
          <article-title>"NIS2 Directive."</article-title>
          <source>Digital Strategy</source>
          ,
          <year>2023</year>
          . URL: https://digitalstrategy.ec.europa.eu/en/policies/nis2-directive.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          <article-title>Agency for Cybersecurity (ENISA). "CSIRTs by Country</article-title>
          - Interactive
          <string-name>
            <surname>Map</surname>
          </string-name>
          ." Available at: https://www.enisa.europa.eu/topics/incident-response/
          <article-title>csirt-inventory/certs-by-country-interactive-map (</article-title>
          <source>Accessed: 28 May</source>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kassim</surname>
            ,
            <given-names>S. R. B. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Arief</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions</article-title>
          . doi:
          <volume>10</volume>
          .1145/3609230.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Van der Kleij</surname>
          </string-name>
          , R.,
          <string-name>
            <surname>Kleinhuis</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Young</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Computer security incident response team effectiveness: A needs assessment</article-title>
          .
          <source>In Frontiers in Psychology</source>
          , 8
          <article-title>(DEC), art</article-title>
          . no.
          <issue>2179</issue>
          . Available at: https://www.frontiersin.org/articles/10.3389/fpsyg.
          <year>2017</year>
          .02179/full, doi:10.3389/fpsyg.
          <year>2017</year>
          .
          <volume>02179</volume>
          (
          <issue>Accessed</issue>
          : 28 May
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Forum of Incident Response and Security Teams, Inc</article-title>
          . (
          <year>2019</year>
          ).
          <article-title>Computer Security Incident Response Team (CSIRT</article-title>
          )
          <article-title>Services Framework</article-title>
          . Available at: https://www.first.org/standards/frameworks/csirts/FIRST_CSIRT_Services_
          <source>Framew ork_v2.1.0.pdf (Accessed: 28 May</source>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Wara</surname>
            ,
            <given-names>Y.M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>A Guide to Establishing Computer Security Incident Response Team (CSIRT) For National Research and Education Network (NREN</article-title>
          ),
          <volume>8</volume>
          (
          <issue>2</issue>
          ). [7]
          <string-name>
            <surname>Brecht</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>The Skills and Experience Needed to Support A CSIRT SOC or SIEM Team</article-title>
          .
          <source>InfoSec Resources</source>
          ,
          <year>February 2018</year>
          . Available at: https://resources.infosecinstitute.
          <article-title>com/skills-experience-needed-support-csirt-soc-siemteam/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Bada</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          et al. (
          <year>2020</year>
          ).
          <article-title>Computer Security Incident Response Teams (CSIRTs) An Overview</article-title>
          . Available at: https://ssrn.com/abstract=3659974Avai
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Mooi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Botha</surname>
            ,
            <given-names>R.A.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Prerequisites for building a Computer Security Incident Response capability</article-title>
          .
          <source>In 2015 Information Security for South Africa (ISSA)</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . Available at: https://doi.org/10.1109/ISSA.
          <year>2015</year>
          .
          <volume>7335057</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Home - CSIRT</surname>
          </string-name>
          (
          <year>2024</year>
          ). Available at: https://csirt.cz/en/ (Accessed: 28 May
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Guttman</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Brownlee</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>1998</year>
          ).
          <article-title>Expectations for Computer Security Incident Response</article-title>
          .
          <article-title>Request for Comments RFC 2350</article-title>
          . Internet Engineering Task Force. doi:
          <volume>10</volume>
          .17487/RFC2350.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Team</surname>
            ,
            <given-names>T.C.S.I.R.</given-names>
          </string-name>
          (
          <year>2024</year>
          ).
          <article-title>The Computer Security Incident Response Team</article-title>
          . Available at: https://csirt.gov.
          <source>pl/cee (Accessed: 28 May</source>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Morgus</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          et al. (
          <year>2015</year>
          ).
          <article-title>NATIONAL CSIRTs AND THEIR ROLE IN COMPUTER SECURITY INCIDENT RESPONSE</article-title>
          , p.
          <fpage>36</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14] Mitchell,
          <string-name>
            <surname>B.</surname>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>CORPORATE CYBERESPIONAGE: IDENTIFICATION AND PREVENTION PART 1</article-title>
          . EDPACS. Available at: https://www.tandfonline.com/doi/abs/10.1080/07366981.
          <year>2020</year>
          .
          <volume>1798594</volume>
          (
          <issue>Accessed</issue>
          : 9
          <source>May</source>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Mohd</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          et al. (
          <year>2016</year>
          ).
          <article-title>CSIRT Management Workflow: Practical Guide for Critical Infrastructure Organizations</article-title>
          . In P. Silva,
          <string-name>
            <given-names>A.</given-names>
            <surname>Guerreiro</surname>
          </string-name>
          , and R.
          <source>Quaresma (eds) Proceedings of the 10th European Conference on Information Systems Management</source>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>146</lpage>
          . Available at: https://www.webofscience.com/wos/woscc/fullrecord/WOS:000400275000018 (
          <issue>Accessed</issue>
          : 8
          <source>May</source>
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Najiyya</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Wulandari</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          (
          <year>2023</year>
          ).
          <article-title>Eksplorasi Implementasi Kebijakan Pembentukan Computer Security Incident Response Team (Csirt) di Kementerian Perdagangan: Sebuah Studi Kualitatif</article-title>
          .
          <source>JRAM (Jurnal Riset Akuntansi Multiparadigma)</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>50</fpage>
          -
          <lpage>55</lpage>
          . Available at: https://doi.org/10.30743/akutansi.v10i1.
          <fpage>7246</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Andrade</surname>
            ,
            <given-names>R.O.</given-names>
          </string-name>
          et al. (
          <year>2019</year>
          ).
          <article-title>Information security management in university campus using cognitive security</article-title>
          .
          <source>Int. J. Comput. Sci. Inf</source>
          . Secur.
          <volume>13</volume>
          (
          <issue>4</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Blair</surname>
            ,
            <given-names>J. R. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hall</surname>
            ,
            <given-names>A. O.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sobiesk</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Educating Future Multidisciplinary Cybersecurity Teams</article-title>
          . Computer,
          <volume>52</volume>
          (
          <issue>3</issue>
          ),
          <fpage>58</fpage>
          -
          <lpage>66</lpage>
          . https://doi.org/10.1109/
          <string-name>
            <surname>MC</surname>
          </string-name>
          .
          <year>2018</year>
          .2884190
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Cybersecurity</surname>
          </string-name>
          , E. U. A. for, &amp;
          <string-name>
            <surname>Taurins</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2020</year>
          ).
          <article-title>How to set up CSIRTs and SOCs - Good practice guide</article-title>
          . https://doi.org/doi/10.2824/056764
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Alothman</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alhajraf</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alajmi</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Farraj</surname>
          </string-name>
          , R. al,
          <string-name>
            <surname>Alshareef</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Developing a Cyber Incident Exercises Model to Educate Security Teams</article-title>
          . Electronics,
          <volume>11</volume>
          (
          <issue>10</issue>
          ),
          <volume>1575</volume>
          . https://doi.org/https://doi.org/10.3390/electronics11101575
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Villegas-Ch</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ortiz-Garces</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sánchez-Viteri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Proposal for an Implementation Guide for a Computer Security Incident Response Team on a University Campus</article-title>
          . Computers,
          <volume>10</volume>
          (
          <issue>8</issue>
          ), 102. https://doi.org/https://doi.org/10.3390/computers10080102
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>O</given-names>
            <surname>'Neill</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Ruoti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Seamons</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            , &amp;
            <surname>Zappala</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          (
          <year>2017</year>
          ).
          <source>TLS Inspection: How Often and Who Cares? IEEE Internet Computing</source>
          ,
          <volume>21</volume>
          (
          <issue>3</issue>
          ),
          <fpage>22</fpage>
          -
          <lpage>29</lpage>
          . https://doi.org/10.1109/MIC.
          <year>2017</year>
          .58
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Zaguir</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. H. de Magalhães and M. de Mesquita Spinola</surname>
          </string-name>
          ,
          <article-title>"Challenges and Enablers for GDPR Compliance: Systematic Literature Review and Future Research Directions,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>12</volume>
          , pp.
          <fpage>81608</fpage>
          -
          <lpage>81630</lpage>
          ,
          <year>2024</year>
          , https://doi.org/10.1109/ACCESS.
          <year>2024</year>
          .3406724
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Vostoupal</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stupka</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Harašta</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasl</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Loutocký</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malinka</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <article-title>The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond</article-title>
          .
          <source>Computer Law &amp; Security Review</source>
          . vol.
          <volume>53</volume>
          ,
          <year>2024</year>
          . ISSN 0267-
          <fpage>364</fpage>
          . https://doi.org/10.1016/j.clsr.
          <year>2024</year>
          .105988
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Vandezande</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <article-title>Cybersecurity in the EU: How the NIS2-directive stacks up against its predecessor</article-title>
          .
          <source>Computer Law &amp; Security Review</source>
          , vol.
          <volume>52</volume>
          ,
          <year>2024</year>
          . ISSN 0267-
          <fpage>3649</fpage>
          . https://doi.org/10.1016/j.clsr.
          <year>2023</year>
          .105890
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Dsouza</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Are Cyber Security Incident Response Teams (CSIRTs) Redundant or Can They</surname>
          </string-name>
          Be Relevant to International Cyber Security?.
          <source>Federal Communications Law Journal</source>
          , vol.
          <volume>69</volume>
          . Washington.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>