Cyber breach response that actually works (Record no. 69286)

000 -LEADER
fixed length control field 04586cam a2200457Ia 4500
001 - CONTROL NUMBER
control field on1159165163
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711203605.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200620s2020 inu o 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119679349
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119679346
-- (electronic bk. : oBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119679318
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1119679311
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Gorecki, Andrew.
245 10 - TITLE STATEMENT
Title Cyber breach response that actually works
Sub Title organizational approach to managing residual risk /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Indianapolis :
Publisher Wiley,
Year of publication 2020.
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (323 p.)
500 ## - GENERAL NOTE
Remark 1 Description based upon print version of record.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Cyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Defining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Information Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing
505 8# - FORMATTED CONTENTS NOTE
Remark 2 Leveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities
500 ## - GENERAL NOTE
Remark 1 Understanding Incident Management
500 ## - GENERAL NOTE
Remark 1 Includes index.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Management.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Management.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1002/9781119679349
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security
-- (OCoLC)fst00872493
994 ## -
-- 92
-- DG1

No items available.