Book description
The definitive guide to incident response--updated for the first time in a decade!
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks.
- Architect an infrastructure that allows for methodical investigation and remediation
- Develop leads, identify indicators of compromise, and determine incident scope
- Collect and preserve live data
- Perform forensic duplication
- Analyze data from networks, enterprise services, and applications
- Investigate Windows and Mac OS X systems
- Perform malware triage
- Write detailed incident response reports
- Create and implement comprehensive remediation plans
Table of contents
- Cover
- Title Page
- Copyright Page
- About the Authors
- Contents
- Foreword
- Acknowledgments
- Introduction
- Part I: Preparing for the Inevitable Incident
- Part II: Incident Detection and Characterization
-
Part III: Data Collection
- Chapter 7: Live Data Collection
- Chapter 8: Forensic Duplication
- Chapter 9: Network Evidence
- Chapter 10: Enterprise Services
-
Part IV: Data Analysis
- Chapter 11: Analysis Methodology
- Chapter 12: Investigating Windows Systems
- Chapter 13: Investigating Mac OS X Systems
- Chapter 14: Investigating Applications
- Chapter 15: Malware Triage
- Chapter 16: Report Writing
-
Part V: Remediation
-
Chapter 17: Remediation Introduction
- Basic Concepts
- Remediation Pre-Checks
- Form the Remediation Team
- Determine the Timing of the Remediation
- Develop and Implement Remediation Posturing Actions
- Develop and Implement Incident Containment Actions
- Develop the Eradication Action Plan
- Determine Eradication Event Timing and Execute Eradication Plan
- Develop Strategic Recommendations
- Document the Lessons Learned
- Putting It All Together
- Common Mistakes That Lead to Remediation Failure
- So What?
- Questions
- Chapter 18: Remediation Case Study
-
Chapter 17: Remediation Introduction
- Index
Product information
- Title: Incident Response & Computer Forensics, Third Edition, 3rd Edition
- Author(s):
- Release date: August 2014
- Publisher(s): McGraw-Hill
- ISBN: 9780071798693
You might also like
book
Digital Forensics and Incident Response - Third Edition
Incident response tools and techniques for effective cyber threat response Key Features Create a solid incident …
book
Digital Forensics and Incident Response - Second Edition
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key …
book
Digital Forensics and Incident Response
A practical guide to deploying digital forensic techniques in response to cyber security incidents About This …
book
Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer, First Edition
Investigating the Cyber Breach The Digital Forensics Guide for the Network Engineer Understand the realities of …