Cybersecurity Incident Response How to Contain, Eradicate, and Recover from Incidents /

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Thompson, Eric C. (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berkeley, CA : Apress : Imprint: Apress, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Chapter 1: The Significance of Incident Response
  • Chapter 2: Necessary Prerequisites
  • Chapter 3: Incident Response Frameworks
  • Chapter 4: Leadership, Teams, and Culture
  • Chapter 5: The Incident Response Strategy
  • Chapter 6: Cyber Risks and the Attack Lifecycle
  • Chapter 7: Detection and Identification of Events
  • Chapter 8: Containment
  • Chapter 9: Eradication, Recovery, and Post-Incident Review
  • Chapter 10: Continuous Monitoring of Incident Response Program
  • Chapter 11: Incident Response Story
  • Chapter 12: This Is a Full-Time Job
  • Appendix A: NIST CSF.