- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 126字
- 2021-06-30 19:15:48
Incident Response Process
In the last chapter, you learned about the three pillars that sustained your security posture, and two of them (detection and response) are directly correlated with the Incident Response (IR) process. To enhance the foundation of your security posture, you need to have a solid incident response process. This process will dictate how to handle security incidents and rapidly respond to them. Many companies do have an incident response process in place, but they fail to constantly review it to incorporate lessons learned from previous incidents, and on top of that, many are not prepared to handle security incidents in a cloud environment.
In this chapter, we're going to be covering the following topics:
- The incident response process
- Handling an incident
- Post-incident activity
推薦閱讀
- Linux運維之道(第3版)
- Learning Windows Server Containers
- Puppet實戰
- 鴻蒙生態:開啟萬物互聯的智慧新時代
- Linux實戰
- Kali Linux滲透測試全流程詳解
- 無蘋果不生活 OS X Mountain Lion隨身寶典
- Ubuntu Linux操作系統
- Mastering KVM Virtualization
- 高性能Linux服務器構建實戰:系統安全、故障排查、自動化運維與集群架構
- 深入Linux內核架構與底層原理(第2版)
- Learning Bootstrap
- AutoCAD 2014中文版從入門到精通
- Windows Server 2012網絡操作系統項目教程(第4版)
- Introduction to R for Quantitative Finance