官术网_书友最值得收藏!

Summary

In this chapter, you learned about the incident response process, and how this fits into the overall purpose of enhancing your security posture. You also learned about the importance of having an incident response in place to rapidly identify and respond to security incidents. By planning each phase of the incident response life cycle, you create a cohesive process that can be applied to the entire organization. The foundation of the incident response plan is the same for different industries, and on top of this foundation you can include the customized areas that are relevant to your own business. You also came across the key aspects of handling an incident, and the importance of post-incident activity—which includes a full documentation of lessons learned—and using this information as input to improve the overall process. Lastly, you learned the basics of incident response in the cloud and how this can affect your current process.

In the next chapter, you will understand the mindset of an attacker, the different stages of an attack, and what usually takes place in each one of these phases. This is an important concept for the rest of the book, considering that the attack and defense exercises will be using the cybersecurity kill chain as a foundation.

主站蜘蛛池模板: 平江县| 和田市| 临邑县| 邢台县| 日土县| 华宁县| 丹江口市| 武城县| 江津市| 池州市| 科尔| 高安市| 阜城县| 蓝田县| 阳曲县| 阿坝县| 五大连池市| 公主岭市| 喀喇| 邹平县| 新竹县| 来安县| 邵东县| 酉阳| 盖州市| 泸州市| 台南县| 离岛区| 青神县| 泉州市| 清镇市| 阿合奇县| 来凤县| 阿克陶县| 肥东县| 抚州市| 聊城市| 福清市| 新密市| 桂东县| 英德市|