Intelligence-Driven Incident Response

Outwitting the Adversary

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Intelligence-Driven Incident Response by Scott J Roberts, Rebekah Brown, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Scott J Roberts, Rebekah Brown ISBN: 9781491935194
Publisher: O'Reilly Media Publication: August 21, 2017
Imprint: O'Reilly Media Language: English
Author: Scott J Roberts, Rebekah Brown
ISBN: 9781491935194
Publisher: O'Reilly Media
Publication: August 21, 2017
Imprint: O'Reilly Media
Language: English

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you’ll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.

Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.

In three parts, this in-depth book includes:

  • The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together
  • Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process—Find, Fix Finish, Exploit, Analyze, and Disseminate
  • The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you’ll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.

Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.

In three parts, this in-depth book includes:

More books from O'Reilly Media

Cover of the book Dreamweaver CS3: The Missing Manual by Scott J Roberts, Rebekah Brown
Cover of the book sed and awk Pocket Reference by Scott J Roberts, Rebekah Brown
Cover of the book Ubuntu: Up and Running by Scott J Roberts, Rebekah Brown
Cover of the book Electronics Cookbook by Scott J Roberts, Rebekah Brown
Cover of the book DevOps with OpenShift by Scott J Roberts, Rebekah Brown
Cover of the book 802.11 Wireless Networks: The Definitive Guide by Scott J Roberts, Rebekah Brown
Cover of the book App Inventor 2 by Scott J Roberts, Rebekah Brown
Cover of the book LINQ: The Future of Data Access in C# 3.0 by Scott J Roberts, Rebekah Brown
Cover of the book OS X Mountain Lion Pocket Guide by Scott J Roberts, Rebekah Brown
Cover of the book Zukunftssichere TYPO3-Extensions mit Extbase und Fluid by Scott J Roberts, Rebekah Brown
Cover of the book DOM Enlightenment by Scott J Roberts, Rebekah Brown
Cover of the book Das Buch zu Raspberry Pi mit Linux by Scott J Roberts, Rebekah Brown
Cover of the book Selectors, Specificity, and the Cascade by Scott J Roberts, Rebekah Brown
Cover of the book Raspberry Pi Hacks by Scott J Roberts, Rebekah Brown
Cover of the book Ruby in a Nutshell by Scott J Roberts, Rebekah Brown
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy