- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 195字
- 2021-06-30 19:15:49
Incident life cycle
Every incident that starts must have an end, and what happens in between the beginning and the end are different phases that will determine the outcome of the response process. This is an ongoing process that we call the incident life cycle. What we have described until now can be considered the preparation phase. However, this phase is broader than that—it also has the partial implementation of security controls that were created based on the initial risk assessment (this was supposedly done even before creating the incident response process).
Also included in the preparation phase is the implementation of other security controls, such as:
- Endpoint protection
- Malware protection
- Network security
The preparation phase is not static, and you can see in the following diagram that this phase will receive input from post-incident activity.
The other phases of the life cycle and how they interact are also shown in this diagram:

The DETECTION and CONTAINMENT phase could have multiple interactions within the same incident. Once the loop is over, you will move on to the post-incident activity phase. The sections that follow will cover these last three phases in more detail.
- 阿里云數字新基建系列:云原生操作系統Kubernetes
- Learning Android Intents
- 精解Windows 8
- Linux操作系統應用編程
- 深入Linux內核架構與底層原理(第2版)
- Java EE 8 Design Patterns and Best Practices
- 數據中心系統工程及應用
- Linux系統安全基礎:二進制代碼安全性分析基礎與實踐
- Linux內核觀測技術BPF
- Ceph分布式存儲實戰
- 從實踐中學習Kali Linux無線網絡滲透測試
- iOS 10快速開發:18天零基礎開發一個商業應用
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)
- VMware vSphere 5.1 Cookbook
- UNIX傳奇:歷史與回憶