Incident Response
A Strategic Guide to Handling System and Network Security Breaches
E. Eugene Schultz, Russell Shumway
Résumé
This book will teach readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with all phases of incident response effectively spanning from pre-incident conditions and considerations to the end of an incident.
Although technical considerations are included (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted, the types of logging data available in major operating systems and how to interpret it to obtain information about incidents, how network attacks can be detected on the basis of information contained in packets, and so on, the major focus of this book is on managerial and procedural matters.
Incident Response advances the notion that without effective management, incident response cannot succeed.
Contents
(NOTE: Each chapter concludes with a
Summary/Conclusion.)
1. An Introduction to Incident
Response.
What Is Incident Response? The Rationale for Incident
Response. Overview of Incident Response.
2. Risk Analysis.
About Risk Analysis. Types of Security-Related Risks.
Obtaining Data About Security-Related Incidents. The
Importance of Risk Analysis in Incident Response.
3. A Methodology for Incident
Response.
Rationale for Using an Incident Response Methodology. A
Six-Stage Methodology for Incident Response. Caveats.
4. Forming and Managing an Incident Response
Team.
What Is an Incident Response Team? Why Form an Incident
Response Team? Issues in Forming a Response Team. About
Managing an Incident Response Effort.
5. Organizing for Incident
Response.
Virtual Teams-Ensuring Availability. Training the Team.
Testing the Team. Barriers to Success. External
Coordination. Managing Incidents.
6. Tracing Network Attacks.
What Does Tracing Network Attacks Mean? Putting Attack
Tracing in Context. Tracing Methods. Next Steps.
Constructing an "Attack Path" . Final Caveats.
7. Legal Issues.
U.S. Computer Crime Statutes. International Statutes.
Search, Seizure, and Monitoring. Policies. Liability. To
Prosecute or Not?
8. Forensics I.
Guiding Principles. Forensics Hardware. Forensics
Software. Acquiring Evidence. Examination of the
Evidence.
9. Forensics II.
Covert Searches. Advanced Searches. Encryption. Home Use
Systems. UNIX and Server Forensics.
10. Responding to Insider Attacks.
Types of Insiders. Types of Attacks. Preparing for Insider
Attacks. Detecting Insider Attacks. Responding to Insider
Attacks. Special Considerations. Special Situations. Legal
Issues.
11. The Human Side of Incident
Response.
Integration of the Social Sciences into Incident Response.
Part I: Cybercrime Profiling. Part II: Insider Attacks.
Part III: Incident Victims. Part IV: Human Side of Incident
Response.
12. Traps and Deceptive Measures.
About Traps and Deceptive Measures. Advantages and
Limitations of Traps and Deceptive Measures. Focus:
Honeypots. Integrating Traps and Deceptive Measures into
Incident Response.
13. Future Directions in Incident
Response.
Technical Advances. Social Advances. The Progress of the
Profession. The Nature of Incidents.
Appendix A. RFC-2196.
Site Security Handbook.
Appendix B. Incident Response and Reporting
Checklist.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | New Riders |
Auteur(s) | E. Eugene Schultz, Russell Shumway |
Parution | 01/02/2002 |
Nb. de pages | 384 |
Format | 17,6 x 22,8 |
Couverture | Broché |
Poids | 600g |
Intérieur | Noir et Blanc |
EAN13 | 9781578702565 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet