Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents /

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavný autor: Thompson, Eric C. (Autor)
Médium: Elektronický zdroj E-kniha
Jazyk:English
Vydavateľské údaje: Berkeley, CA : Apress, 2018.
Vydanie:1st ed. 2018.
Predmet:
ISBN:9781484238707
On-line prístup: Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618120231.0
007 cr nn 008mamaa
008 180920s2018 xxu| s |||| 0|eng d
020 |a 9781484238707 
024 7 |a 10.1007/978-1-4842-3870-7  |2 doi 
035 |a CVTIDW08222 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
100 1 |a Thompson, Eric C.  |4 aut 
245 1 0 |a Cybersecurity Incident Response  |h [electronic resource] :  |b How to Contain, Eradicate, and Recover from Incidents /  |c by Eric C. Thompson. 
250 |a 1st ed. 2018. 
260 1 |a Berkeley, CA :  |b Apress,  |c 2018. 
300 |a XV, 176 p. 62 illus.  |b online resource. 
500 |a Professional and Applied Computing  
505 0 |a Chapter 1: The Significance of Incident Response -- Chapter 2: Necessary Prerequisites -- Chapter 3: Incident Response Frameworks -- Chapter 4: Leadership, Teams, and Culture -- Chapter 5: The Incident Response Strategy -- Chapter 6: Cyber Risks and the Attack Lifecycle -- Chapter 7: Detection and Identification of Events -- Chapter 8: Containment -- Chapter 9: Eradication, Recovery, and Post-Incident Review -- Chapter 10: Continuous Monitoring of Incident Response Program -- Chapter 11: Incident Response Story -- Chapter 12: This Is a Full-Time Job -- Appendix A: NIST CSF. 
516 |a text file PDF 
520 |a Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You'll Learn: Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team. 
650 0 |a Data protection. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-1-4842-3870-7  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE05502 
919 |a 978-1-4842-3870-7 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 274676  |d 274676