Search Results - "incident response"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Computer incident response and forensics team management conducting a successful incident response by Johnson, Leighton

    Published 2014
    Table of Contents: “…Introduction -- Definitions -- The stages of incident response -- The security incident response team members -- Incident evidence -- Incident response tools -- Incident response policies and procedures -- Legal requirements and considerations -- Governmental laws, policies and procedures -- Forensics process -- Forensics team member requirements -- Forensics team policies and procedures -- Management of forensics evidence handling -- Forensics tools -- Legalities of forensics -- Forensics team oversight -- General team management -- Corporate it management -- Relationship management -- Conclusion.…”
    Book
  2. 2
  3. 3
  4. 4

    Intelligence-driven incident response outwitting the adversary by Roberts, Scott J., Brown, Rebekah

    Published 2017
    Book
  5. 5

    Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia by Pepe, Matthew

    Published 2014
    Table of Contents: “…Part 1 Preparing for the Inevitable Incident -- 1 Real World Incidents -- 2 IR Management Handbook -- 3 Pre-Incident Preparation -- Part 2 Incident Detection and Characterization -- 4 Getting the Investigation Started -- 5 Initial Development of Leads -- 6 Discovering the Scope of the Incident -- Part 3 Data Collection -- 7 Live Data Collection -- 8 Forensic Duplication -- 9 Network Evidence -- 10 Enterprise Services -- Part 4 Data Analysis -- 11 Analysis Methodology -- 12 Investigating Windows Systems -- 13 Investigating MacOS Systems -- 14 Investigating Applications --15 Malware Triage --16 Report Writing -- Part 5 Remediation -- 17 Remediation Introduction -- 18 Remediation Case Studies -- Part 6 Appendices -- App A Answers to Questions -- App B Incident Response Forms…”
    Book
  6. 6
  7. 7
  8. 8

    Real digital forensics computer security and incident response by Jones (Keith John)

    Published 2005
    Book
  9. 9
  10. 10

    Malware forensics field guide for Linux systems digital forensics field guides by Malin, Cameron H

    Published 2014
    Table of Contents: “…Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.…”
    Book
  11. 11

    Information protection playbook

    Published 2013
    Table of Contents: “…Information protection function one : governance -- Information protection function two : program planning -- Information protection function three : risk management -- Information protection function four : incident response management -- Information protection function five : program administration.…”
    Book
  12. 12
  13. 13

    The basics of digital forensics the primer for getting started in digital forensics by Sammons, John

    Published 2012
    Table of Contents: “…Network Forensics and Incident Response 10. Mobile Device Forensics 11. Looking Ahead: Challenges and Concerns 12. …”
    Book
  14. 14

    Managing information security

    Published 2014
    Table of Contents: “…Ellis -- Cyber forensics and incident response / Cem Gurkok -- Nerwork forensics / Yong Guan.…”
    Book
  15. 15

    A Practical Guide to Digital Forensics Investigations / by Hayes, Darren Richard

    Published 2021
    Book
  16. 16

    Principles of information security by Whitman, Michael E., Mattord, Herbert J.

    Published 2022
    Book
  17. 17

    Practical cloud security a guide for secure design and deployment by Dotson, Chris

    Published 2019
    Book
  18. 18
  19. 19
  20. 20

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…-- Design case -- ch. 9 Hardware and Software Controls -- Overview -- Password management -- Access control -- Firewalls -- Intrusion detection/prevention systems -- Patch management for operating systems and applications -- End-point protection -- Example case -- AirTight networks -- Chapter review questions -- Example case questions -- Hands-on activity -- host-based IDS (OSSEC) -- Critical thinking exercise -- extra-human security controls -- Design case -- ch. 10 Shell Scripting -- Overview -- Introduction -- Output redirection -- Text manipulation -- Variables -- Conditionals -- User input -- Loops -- Putting it all together -- Example case -- Max Butler -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic scripting -- Critical thinking exercise -- script security -- Design case -- ch. 11 Incident Handling -- Introduction -- Incidents overview -- Incident handling -- The disaster -- Example case -- on-campus piracy -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- incident timeline using OSSEC -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 12 Incident Analysis -- Introduction -- Log analysis -- Event criticality -- General log configuration and maintenance -- Live incident response -- Timelines -- Other forensics topics -- Example case -- backup server compromise -- Chapter review questions -- Example case questions -- Hands-on activity -- server log analysis -- Critical thinking exercise -- destruction at the EDA -- Design case -- ch. 13 Policies, Standards, and Guidelines -- Introduction -- Guiding principles -- Writing a policy -- Impact assessment and vetting -- Policy review -- Compliance -- Key policy issues -- Example case -- HB Gary -- Summary -- Reference -- Chapter review questions -- Example case questions -- Hands-on activity -- create an AUP -- Critical thinking exercise -- Aaron Swartz -- Design case -- ch. 14 IT Risk Analysis and Risk Management -- Overview -- Introduction -- Risk management as a component of organizational management -- Risk-management framework -- The NIST 800-39 framework -- Risk assessment -- Other risk-management frameworks -- IT general controls for Sarbanes--Oxley compliance -- Compliance versus risk management -- Selling security -- Example case -- online marketplace purchases -- Summary -- Chapter review questions -- Hands-on activity -- risk assessment using LSOF -- Critical thinking exercise -- risk estimation biases -- Design case.…”
    Book