- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 214字
- 2021-06-30 19:15:51
Summary
In this chapter, you learned about the incident response process, and how this fits into the overall purpose of enhancing your security posture. You also learned about the importance of having an incident response in place to rapidly identify and respond to security incidents. By planning each phase of the incident response life cycle, you create a cohesive process that can be applied to the entire organization. The foundation of the incident response plan is the same for different industries, and on top of this foundation you can include the customized areas that are relevant to your own business. You also came across the key aspects of handling an incident, and the importance of post-incident activity—which includes a full documentation of lessons learned—and using this information as input to improve the overall process. Lastly, you learned the basics of incident response in the cloud and how this can affect your current process.
In the next chapter, you will understand the mindset of an attacker, the different stages of an attack, and what usually takes place in each one of these phases. This is an important concept for the rest of the book, considering that the attack and defense exercises will be using the cybersecurity kill chain as a foundation.
- Getting Started with oVirt 3.3
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Instant Handlebars.js
- Linux操作系統(tǒng)應用編程
- Mastering Reactive JavaScript
- 計算機應用基礎(Windows 7+Office 2016)
- Cassandra 3.x High Availability(Second Edition)
- 寫給架構師的Linux實踐:設計并實現(xiàn)基于Linux的IT解決方案
- 分布式高可用架構之道
- Linux軟件管理平臺設計與實現(xiàn)
- Learn SwiftUI
- Mastering Windows 8 C++ App Development
- VMware vSphere 5.1 Cookbook
- Angular權威教程
- Docker容器技術與運維