000 03613cam a2200277zu 4500
001 88910714
003 FRCYB88910714
005 20250107233958.0
006 m o d
007 cr un
008 250108s2021 fr | o|||||0|0|||eng d
020 _a9781800569218
035 _aFRCYB88910714
040 _aFR-PaCSA
_ben
_c
_erda
100 1 _aOzkaya, Dr. Erdal
245 0 1 _aIncident Response in the Age of Cloud
_c['Ozkaya, Dr. Erdal']
264 1 _bPackt Publishing
_c2021
300 _a p.
336 _btxt
_2rdacontent
337 _bc
_2rdamdedia
338 _bc
_2rdacarrier
650 0 _a
700 0 _aOzkaya, Dr. Erdal
856 4 0 _2Cyberlibris
_uhttps://international.scholarvox.com/netsen/book/88910714
_qtext/html
_a
520 _aLearn to identify a security incident and build a series of best practices to stop a cyberattack before it creates serious consequencesKey FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading figures in the cybersecurity communityBook DescriptionCybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book provides updated IR processes to address the associated security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence, and the procedures involved in IR in the cloud – the challenges, opportunities, and how to secure your cloud environments. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learnUnderstand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to a security vulnerability based on Keepnet Labs processes and practicesAdapt all the above learnings for the cloudWho this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology (IT) or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.
999 _c73707
_d73707