Cybersecurity Incident Response

How to Contain, Eradicate, and Recover from Incidents



Bookstore > Books > Cybersecurity Incident Response

Cybersecurity Incident Response
Price$24.90 - $31.80
Rating
AuthorEric C. Thompson
PublisherApress
Published2018
Pages176
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101484238699
ISBN-139781484238691
EBook Hardcover Paperback

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.

The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.

Know the sub-categories of the NIST Cybersecurity Framework; Understand the components of incident response; Go beyond the incident response plan; Turn the plan into a program that needs vision, leadership, and culture to make it successful; Be effective in your role on the incident response team.





Similar Books


Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

by Scott Roberts, Rebekah Brown

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll le...

Price:  $42.88  |  Publisher:  O'Reilly Media  |  Release:  2017

Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

by Jeff Bollinger, Brandon Enright, Matthew Valites

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own thre...

Price:  $33.92  |  Publisher:  O'Reilly Media  |  Release:  2015

The Art of Memory Forensics

The Art of Memory Forensics

by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident r...

Price:  $34.00  |  Publisher:  Wiley  |  Release:  2014

Principles of Computer Security, 5th Edition

Principles of Computer Security, 5th Edition

by Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...

Price:  $105.99  |  Publisher:  McGraw-Hill  |  Release:  2018

Oracle Incident Response and Forensics

Oracle Incident Response and Forensics

by Pete Finnigan

Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used...

Price:  $24.99  |  Publisher:  Apress  |  Release:  2018

Microsoft Azure Security Center

Microsoft Azure Security Center

by Yuri Diogenes, Tom Shinder

This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key opera...

Price:  $27.99  |  Publisher:  Microsoft Press  |  Release:  2018

Learning Malware Analysis

Learning Malware Analysis

by Monnappa K A

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, respon...

Price:  $39.99  |  Publisher:  Packt Publishing  |  Release:  2018

Real-World SRE

Real-World SRE

by Nat Welch

Real-World SRE is the go-to survival guide for the software developer in the middle of catastrophic website failure. Site Reliability Engineering (SRE) has emerged on the frontline as businesses strive to maximize uptime. This book is a step-by-step framework to follow when your website is down and the countdown is on to fix it.Nat Welch ...

Price:  $39.99  |  Publisher:  Packt Publishing  |  Release:  2018