Search Results - "incident response"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer crimes 12
- Computer security 11
- Security measures 10
- Computer networks 9
- investigation 7
- Digital forensic science 3
- Investigation 3
- Data protection 2
- Forensic sciences 2
- Information technology 2
- Malware (Computer software) 2
- Computer viruses 1
- Data recovery (computer science) 1
- Database management 1
- Database security 1
- Electronic data processing departments 1
- Evidence, Criminal 1
- Iinvestigation 1
- Industries 1
- Management 1
- Penetration testing (Computer security) 1
- Planning 1
- Prevention 1
- access control 1
- iPad (Computer) 1
- iPhone (Smartphone) 1
- management 1
- security measures 1
-
1
Computer incident response and forensics team management conducting a successful incident response
Published 2014Table of Contents: “…Introduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion.…”
Book -
2
-
3
-
4
-
5
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
Published 2014Table of Contents: “…Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms…”
Book -
6
-
7
-
8
-
9
-
10
Malware forensics field guide for Linux systems digital forensics field guides
Published 2014Table of Contents: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.…”
Book -
11
Information protection playbook
Published 2013Table of Contents: “…Information protection function one : governance -- Information protection function two : program planning -- Information protection function three : risk management -- Information protection function four : incident response management -- Information protection function five : program administration.…”
Book -
12
-
13
The basics of digital forensics the primer for getting started in digital forensics
Published 2012Table of Contents: “…Network Forensics and Incident Response 10. Mobile Device Forensics 11. Looking Ahead: Challenges and Concerns 12. …”
Book -
14
Managing information security
Published 2014Table of Contents: “…Ellis -- Cyber forensics and incident response / Cem Gurkok -- Nerwork forensics / Yong Guan.…”
Book -
15
-
16
-
17
-
18
-
19
-
20
Information security and IT risk management
Published 2014Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
Book


