|
Showing 1 - 6 of
6 matches in All Departments
Using a well-conceived incident response plan in the aftermath of
an online security breach enables your team to identify attackers
and learn how they operate. But only when you approach incident
response with a cyberthreat intelligence mindset will you truly
understand the value of that information. In this updated second
edition, you'll learn the fundamentals of intelligence analysis as
well as the best ways to incorporate these techniques into your
incident response process. Each method reinforces the other: threat
intelligence supports and augments incident response, while
incident response generates useful threat intelligence. This
practical guide helps incident managers, malware analysts, reverse
engineers, digital forensics specialists, and intelligence analysts
understand, implement, and benefit from this relationship. In three
parts, this in-depth book includes: The fundamentals: get an
introduction to cyberthreat intelligence, the intelligence process,
the incident response process, and how they all work together
Practical application: walk through the intelligence-driven
incident response (IDIR) process using the F3EAD process: Find,
Fix, Finish, Exploit, Analyze, and Disseminate The way forward:
explore big-picture aspects of IDIR that go beyond individual
incident response investigations, including intelligence team
building
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.