官术网_书友最值得收藏!

Summary

In this chapter, you learned about the incident response process, and how this fits into the overall purpose of enhancing your security posture. You also learned about the importance of having an incident response in place to rapidly identify and respond to security incidents. By planning each phase of the incident response life cycle, you create a cohesive process that can be applied to the entire organization. The foundation of the incident response plan is the same for different industries, and on top of this foundation you can include the customized areas that are relevant to your own business. You also came across the key aspects of handling an incident, and the importance of post-incident activity—which includes a full documentation of lessons learned—and using this information as input to improve the overall process. Lastly, you learned the basics of incident response in the cloud and how this can affect your current process.

In the next chapter, you will understand the mindset of an attacker, the different stages of an attack, and what usually takes place in each one of these phases. This is an important concept for the rest of the book, considering that the attack and defense exercises will be using the cybersecurity kill chain as a foundation.

主站蜘蛛池模板: 清新县| 汉寿县| 沙湾县| 阿鲁科尔沁旗| 梁平县| 丹江口市| 衡阳县| 谢通门县| 无极县| 江北区| 洛浦县| 德州市| 商洛市| 阿巴嘎旗| 江陵县| 淮安市| 祥云县| 双鸭山市| 小金县| 逊克县| 万宁市| 铜梁县| 门头沟区| 郯城县| 兴安县| 渝中区| 犍为县| 潞西市| 大埔县| 泽普县| 广平县| 鲜城| 福建省| 日照市| 乌兰察布市| 昔阳县| 胶州市| 来安县| 安泽县| 禄丰县| 绿春县|