1. Aberdeen Group (2003), “Turning IT security into effective business risk management”, An Executive White Paper, available at: www.ca.com.
2. Arvidsson, J., Cormack, A., Demchenko, Y. and Meijer, J. (2001), “TERENA's incident object description and exchange format requirements”, RFC 3067, available at: www.ietf.org.
3. BSI (1999), Information Security Management, BS7799, Part 1: Code of Practice for Information Security Management, BSI, Bonn.
4. CERT Advisory CA‐2001‐26 (2001), Nimda Worm, available at: www.cert.org.
5. Chien, E. and Ször, P. (2002), “Blended attacks exploits, vulnerabilities and buffer‐overflow techniques in computer viruses”, paper presented at Virus Bulletin Conference, New Orleans, LA, September.