000 | 04586cam a2200457Ia 4500 | ||
---|---|---|---|
001 | on1159165163 | ||
003 | OCoLC | ||
005 | 20220711203605.0 | ||
006 | m d | ||
007 | cr un|---aucuu | ||
008 | 200620s2020 inu o 001 0 eng d | ||
040 |
_aEBLCP _beng _cEBLCP _dDG1 _dUKAHL _dOCLCF _dYDX |
||
020 |
_a9781119679349 _q(electronic bk. : oBook) |
||
020 |
_a1119679346 _q(electronic bk. : oBook) |
||
020 | _a9781119679318 | ||
020 | _a1119679311 | ||
035 | _a(OCoLC)1159165163 | ||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aGorecki, Andrew. _99102 |
|
245 | 1 | 0 |
_aCyber breach response that actually works _h[electronic resource] : _borganizational approach to managing residual risk / _cAndrew Gorecki. |
260 |
_aIndianapolis : _bWiley, _c2020. |
||
300 | _a1 online resource (323 p.) | ||
500 | _aDescription based upon print version of record. | ||
505 | 0 | _aCover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management | |
505 | 8 | _aCyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team | |
505 | 8 | _aDefining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance | |
505 | 8 | _aInformation Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing | |
505 | 8 | _aLeveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities | |
500 | _aUnderstanding Incident Management | ||
500 | _aIncludes index. | ||
590 |
_aJohn Wiley and Sons _bWiley Frontlist Obook All English 2020 |
||
650 | 0 |
_aComputer security _xManagement. _94979 |
|
650 | 7 |
_aComputer security _xManagement. _2fast _0(OCoLC)fst00872493 _94979 |
|
655 | 4 |
_aElectronic books. _93294 |
|
776 | 0 | 8 |
_iPrint version: _aGorecki, Andrew _tCyber Breach Response That Actually Works : Organizational Approach to Managing Residual Risk _dNewark : John Wiley & Sons, Incorporated,c2020 _z9781119679325 |
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119679349 _zWiley Online Library |
942 | _cEBK | ||
994 |
_a92 _bDG1 |
||
999 |
_c69286 _d69286 |