Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents /
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving...
Uloženo v:
| Hlavní autor: | |
|---|---|
| Médium: | Elektronický zdroj E-kniha |
| Jazyk: | angličtina |
| Vydáno: |
Berkeley, CA :
Apress,
2018.
|
| Vydání: | 1st ed. 2018. |
| Témata: | |
| ISBN: | 9781484238707 |
| On-line přístup: |
|
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
Obsah:
- Chapter 1: The Significance of Incident Response
- Chapter 2: Necessary Prerequisites
- Chapter 3: Incident Response Frameworks
- Chapter 4: Leadership, Teams, and Culture
- Chapter 5: The Incident Response Strategy
- Chapter 6: Cyber Risks and the Attack Lifecycle
- Chapter 7: Detection and Identification of Events
- Chapter 8: Containment
- Chapter 9: Eradication, Recovery, and Post-Incident Review
- Chapter 10: Continuous Monitoring of Incident Response Program
- Chapter 11: Incident Response Story
- Chapter 12: This Is a Full-Time Job
- Appendix A: NIST CSF.

