Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Verfasst von:Ozkaya, Erdal [VerfasserIn]   i
Titel:Incident Response in the Age of Cloud
Institutionen:Safari, an O’Reilly Media Company. [MitwirkendeR]   i
Verf.angabe:Ozkaya, Erdal
Ausgabe:1st edition
Verlagsort:[Erscheinungsort nicht ermittelbar]
Verlag:Packt Publishing
Jahr:2021
Umfang:1 online resource (622 pages)
Fussnoten:Online resource; Title from title page (viewed February 26, 2021)
ISBN:978-1-80056-921-8
Abstract:Learn to identify a security incident and build a series of best practices to stop a cyberattack before it creates serious consequences Key Features Discover Incident Response (IR), from its evolution to implementation Understand cybersecurity essentials and IR best practices through real-world phishing incident scenarios Explore the current challenges in IR through the perspectives of leading figures in the cybersecurity community Book Description Cybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book provides updated IR processes to address the associated security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence, and the procedures involved in IR in the cloud – the challenges, opportunities, and how to secure your cloud environments. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learn Understand IR and its significance Organize an IR team Explore best practices for managing attack situations with your IR team Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity Organize all the entities involved in product security response Respond to a security vulnerability based on Keepnet Labs processes and practices Adapt all the above learnings for the cloud Who this book is for This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and...
ComputerInfo:Mode of access: World Wide Web.
URL:Aggregator: https://learning.oreilly.com/library/view/-/9781800569218/?ar
Datenträger:Online-Ressource
Sprache:eng
Sach-SW:Electronic books ; local
K10plus-PPN:1751458040
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m3889219438
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/68713153   QR-Code
zum Seitenanfang