Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents /

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving...

Celý popis

Uloženo v:
Podrobná bibliografie
Hlavní autor: Thompson, Eric C. (Autor)
Médium: Elektronický zdroj E-kniha
Jazyk:angličtina
Vydáno: Berkeley, CA : Apress, 2018.
Vydání:1st ed. 2018.
Témata:
ISBN:9781484238707
On-line přístup: Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Obsah:
  • Chapter 1: The Significance of Incident Response
  • Chapter 2: Necessary Prerequisites
  • Chapter 3: Incident Response Frameworks
  • Chapter 4: Leadership, Teams, and Culture
  • Chapter 5: The Incident Response Strategy
  • Chapter 6: Cyber Risks and the Attack Lifecycle
  • Chapter 7: Detection and Identification of Events
  • Chapter 8: Containment
  • Chapter 9: Eradication, Recovery, and Post-Incident Review
  • Chapter 10: Continuous Monitoring of Incident Response Program
  • Chapter 11: Incident Response Story
  • Chapter 12: This Is a Full-Time Job
  • Appendix A: NIST CSF.