- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 126字
- 2021-06-30 19:15:48
Incident Response Process
In the last chapter, you learned about the three pillars that sustained your security posture, and two of them (detection and response) are directly correlated with the Incident Response (IR) process. To enhance the foundation of your security posture, you need to have a solid incident response process. This process will dictate how to handle security incidents and rapidly respond to them. Many companies do have an incident response process in place, but they fail to constantly review it to incorporate lessons learned from previous incidents, and on top of that, many are not prepared to handle security incidents in a cloud environment.
In this chapter, we're going to be covering the following topics:
- The incident response process
- Handling an incident
- Post-incident activity
推薦閱讀
- Mastering vRealize Operations Manager(Second Edition)
- Linux操作系統(tǒng)應用編程
- Linux就該這么學
- 計算機系統(tǒng)的自主設計
- RHCSARHCE 紅帽Linux認證學習指南(第7版)EX200 & EX300
- Windows 7實戰(zhàn)從入門到精通(超值版)
- Linux操作系統(tǒng)
- OpenStack Essentials(Second Edition)
- Microsoft DirectAccess Best Practices and Troubleshooting
- 48小時精通SolidWorks 2014中文版鈑金設計技巧
- Windows Server 2012活動目錄企業(yè)應用(微課版)
- UG NX 4.0基礎培訓標準教程
- 你必須掌握的Windows 8技巧
- Python網(wǎng)絡編程(Linux)
- CentOS 7系統(tǒng)管理與運維實戰(zhàn)