- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 195字
- 2021-06-30 19:15:49
Incident life cycle
Every incident that starts must have an end, and what happens in between the beginning and the end are different phases that will determine the outcome of the response process. This is an ongoing process that we call the incident life cycle. What we have described until now can be considered the preparation phase. However, this phase is broader than that—it also has the partial implementation of security controls that were created based on the initial risk assessment (this was supposedly done even before creating the incident response process).
Also included in the preparation phase is the implementation of other security controls, such as:
- Endpoint protection
- Malware protection
- Network security
The preparation phase is not static, and you can see in the following diagram that this phase will receive input from post-incident activity.
The other phases of the life cycle and how they interact are also shown in this diagram:

The DETECTION and CONTAINMENT phase could have multiple interactions within the same incident. Once the loop is over, you will move on to the post-incident activity phase. The sections that follow will cover these last three phases in more detail.
- Linux運維之道(第3版)
- Linux實戰(zhàn)
- 曝光:Linux企業(yè)運維實戰(zhàn)
- 高性能Linux服務(wù)器構(gòu)建實戰(zhàn):運維監(jiān)控、性能調(diào)優(yōu)與集群應(yīng)用
- Ganglia系統(tǒng)監(jiān)控
- 混沌工程:復(fù)雜系統(tǒng)韌性實現(xiàn)之道
- 8051軟核處理器設(shè)計實戰(zhàn)
- 寫給架構(gòu)師的Linux實踐:設(shè)計并實現(xiàn)基于Linux的IT解決方案
- Linux內(nèi)核分析及應(yīng)用
- 鴻蒙入門:HarmonyOS應(yīng)用開發(fā)
- Apache ShardingSphere權(quán)威指南
- Linux網(wǎng)絡(luò)操作系統(tǒng)項目教程(RHEL 6.4/CentOS 6.4)(第2版)
- Windows PE權(quán)威指南
- Windows 11使用方法與技巧從入門到精通
- 不可不知的Windows技巧