Vtome.ru - электронная библиотека

What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century

  • Добавил: literator
  • Дата: 8-10-2022, 13:43
  • Комментариев: 0
What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st CenturyНазвание: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century
Автор: Shimon Brathwaite
Издательство: CRC Press
Год: 2023
Страниц: 189
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.

Incident Reporting Mechanisms: You need an efficient method of reporting when an incident happens to the appropriate person. Ideally, it will be a mixture of automated and manual processes. For example, in Amazon Web Services (AWS), you can configure the environment with cloudwatch (an event monitoring tool) and their SNS services (notification service) to have alerts sent directly to administrators. You should configure your security tools to send alerts directly to incident handlers when certain events occur. Second, for the manual aspect team managers should know who to report an incident to if they think a security issue has occurred or there is an issue that may lead to one. This information can be reported via email, text, or phone call, especially in time-sensitive situations. NIST also recommends that at least one mechanism should permit people to report incidents anonymously, this is particularly important if someone wants to report fraud/insider threat activity.

Скачать What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century












НЕ РАБОТАЕТ TURBOBIT.NET? ЕСТЬ РЕШЕНИЕ, ЖМИ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.