Digital forensics and incident response incident response tools and techniques for effective cyber threat response

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a ne...

Full description

Saved in:
Bibliographic Details
Main Author: Johansen, Gerard (Author)
Format: Book
Language:English
Published: United Kingdom Packt Publishing 2022
Edition:3rd edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 95368
003 MY-KLNDU
005 20241220004342.0
008 230513 2022 xxka 001 0 eng d
020 |a 9781803238678 
039 9 |a 202401110915  |b rafizah  |c 202401031551  |d sani  |c 202401031532  |d sani  |c 202401031531  |d sani  |y 202305130943  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 0 0 |a HV 8078.7 
090 |a HV 8078.7  |b .J64 2022 
100 1 |a Johansen, Gerard  |e author 
245 1 0 |a Digital forensics and incident response  |b incident response tools and techniques for effective cyber threat response  |c Gerard Johansen 
250 |a 3rd edition 
264 1 |a United Kingdom  |b Packt Publishing  |c 2022 
264 4 |c © 2022 
300 |a xii, 511 pages  |b illustrations  |c 30 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks. After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization. 
592 |a 42470  |b 20/7/2023  |c RM245.85  |h Bookline Services 
650 0 |a Digital forensic science 
650 0 |a Computer crimes  |x Iinvestigation 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
999 |a vtls000105261  |c 95368  |d 95368