Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents /
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving...
Κύριος συγγραφέας: | |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2018.
|
Έκδοση: | 1st ed. 2018. |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Chapter 1: The Significance of Incident Response
- Chapter 2: Necessary Prerequisites
- Chapter 3: Incident Response Frameworks
- Chapter 4: Leadership, Teams, and Culture
- Chapter 5: The Incident Response Strategy
- Chapter 6: Cyber Risks and the Attack Lifecycle
- Chapter 7: Detection and Identification of Events
- Chapter 8: Containment
- Chapter 9: Eradication, Recovery, and Post-Incident Review
- Chapter 10: Continuous Monitoring of Incident Response Program
- Chapter 11: Incident Response Story
- Chapter 12: This Is a Full-Time Job
- Appendix A: NIST CSF.