- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 126字
- 2021-06-30 19:15:48
Incident Response Process
In the last chapter, you learned about the three pillars that sustained your security posture, and two of them (detection and response) are directly correlated with the Incident Response (IR) process. To enhance the foundation of your security posture, you need to have a solid incident response process. This process will dictate how to handle security incidents and rapidly respond to them. Many companies do have an incident response process in place, but they fail to constantly review it to incorporate lessons learned from previous incidents, and on top of that, many are not prepared to handle security incidents in a cloud environment.
In this chapter, we're going to be covering the following topics:
- The incident response process
- Handling an incident
- Post-incident activity
推薦閱讀
- Linux運維實戰:CentOS7.6操作系統從入門到精通
- 零起點學Linux系統管理
- Red Hat Enterprise Linux 8系統管理實戰
- Arch Linux Environment Setup How-to
- Mastering Distributed Tracing
- Hands-On DevOps with Vagrant
- WindowsServer2012Hyper-V虛擬化部署與管理指南
- Windows Server 2012 Hyper-V Cookbook
- Windows Phone 7.5 Data Cookbook
- Ubuntu Linux操作系統
- 新手易學:系統安裝與重裝
- 網絡操作系統管理與應用(第三版)
- Windows Server 2019 Administration Fundamentals
- Kali Linux 2018:Windows Penetration Testing
- 深入淺出Node.js