The Development of Cyber Security Warning, Advice and Report Points

  • Tony Proctor
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7617)


The threat to electronic information systems increasingly has origins in organised crime or nation-state sponsored or supported activity. Any successful cyber security programme relies upon the sharing of information. How this is achieved is a question that does not currently have an answer. This paper defines and describes cyber security Warning, Advice and Reporting Points (WARPs) as a potential solution. WARPs are most commonly found in the UK and have their origin in UK Critical National Infrastructure. This paper identifies the origins of response to computer security incidents. It then discusses international and UK computer incident response before defining and describing WARP. In doing so it contributes the experience gained at the University of Wolverhampton (who began operating WARPs in 2007). This paper furthermore seeks to examine how the original aims for WARP have developed and progressed since the initiation of the WARP programme.


security information information sharing Warning Advice and Reporting Points 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    CERT, National Computer Security Incident Response Teams,
  2. 2.
  3. 3.
  4. 4.
  5. 5.
  6. 6.
    Burnett, P.: Discussion on the development of WARPs (telephone). Personal Communication (February 01, 2012)Google Scholar
  7. 7.
    Information Assurance Advisory Council. Sharing is Protecting. A review of Information Sharing, Cambridge, UK (2003),
  8. 8.
  9. 9.
    Mitre Corporation. Common Vulnerabilities and Exposures,
  10. 10.
    Ellefsen, I., Von Solms, S.: The Community-oriented Computer Security, Advisory and Warning Team. IST-Africa, 1–8 (2010)Google Scholar
  11. 11.
    Proctor, T.: The Development of Warning, Advice, and Reporting Points (WARPs) in UK National Infrastructure. In: Proceedings: 6rd International Conference on Critical Information Infrastructure Security, Lucerne, Switzerland, September 8-9 (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Tony Proctor
    • 1
  1. 1.School of TechnologyUniversity of WolverhamptonWolverhamptonUK

Personalised recommendations