Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After f...

Full description

Saved in:
Bibliographic Details
Main Author: Johansen, Gerard (Author)
Format: Book
Language:English
Published: United Kingdom Packt Publishing 2020
Edition:Second edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 95369
003 MY-KLNDU
005 20241220004342.0
008 230513 2020 xxka 001 0 eng d
020 |a 9781838649005 (pbk) 
039 9 |a 202401110922  |b rafizah  |c 202401031548  |d sani  |c 202401031544  |d sani  |y 202305130941  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a HV 8078.7 
090 |a HV 8078.7  |b .J64 2020 
100 1 |a Johansen, Gerard  |e author 
245 1 0 |a Digital forensics and incident response  |b incident response techniques and procedures to respond to modern cyber threats  |c Gerard Johansen 
250 |a Second edition 
264 1 |a United Kingdom  |b Packt Publishing  |c 2020 
300 |a vii, 433 pages  |b illustrations  |c 30 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index 
520 |a An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. 
650 0 |a Digital forensic science 
650 0 |a Computer crimes  |x investigation 
650 0 |a Computer networks  |x Security measures 
999 |a vtls000105260  |c 95369  |d 95369