
Résumé
Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on ? Will you be able to tell whether an incident is an attack or a glitch in the system ? Do you know how to assess the possible damage from an incident ?
Incident Response Shows you how to answer questions like these and create a plan for exactly what to do before, during, and after an incident.
The authors of Incident Response draw on years of experience developing and taking part in incident response teams at the highest levels of government and business. They guide you through both the technical and administrative details of effective incident response planning as they describe.
L'auteur - Kenneth R. Van Wyk
Ken van Wyk is Director of Technology for Tekmark Global Service's Technology Risk Management (TGS-TRM) practice, and was Chief Technology Officer and Co-Founder of security firm Para-Protect Services. He was one of the founders of the Computer Emergency Response Team (CERT), and is also the co-author of O'Reilly's Incident Response and Secure Coding: Principles & Practices.
Sommaire
- What Is Incident Response ?
- Real-Life Incidents
- What Is an Incident ?
- About the Bad Guys
- What Is Incident Response?
- Risk Assessment and Incident Response
- Development of Incident Response Efforts
- Are You Ready ? Are You Willing ?
- Incident Response Teams
- Who Should Do It ?
- Public Resource Teams
- Internal Teams
- Commercial Teams
- Vendor Teams
- Ad Hoc Teams
- Forum of Incident Response and Security Teams (FIRST)
- Now Who Should Do It ?
- Planning the Incident Response Program
- Establishing the Incident Response Program
- Internal Versus External
- Types of Incidents
- Who Are the Clients ?
- Summary
- Mission and Capabilities
- Roles and Responsibilities
- Staffing and Training
- Involving the Critical Players
- List of Contacts
- Setting Up a Hotline
- Establishing Procedures
- Awareness and Advertising
- Fire Drills
- Issues and Pitfalls
- State of the Hack
- The Moving Target
- Kping Up with Attack Profiles
- Training
- Incident Response Operations
- We've Been Hit-Now What ?
- Incident Response Processes
- While Under Pressure
- Tools of the Trade
- What's Out There ?
- Network-Based Tools
- Network Monitors and Protocol Analyzers
- Network-Based Intrusion Detection Systems
- Network Vulnerability Scanners
- Other Essential Network-Based Tools
- Host-Based Tools
- Communications
- Encryption
- Removable Storage Media
- The Incident Kit
- If We Ruled the World
- Resources
- Security Information on the Web
- Incident Response Team Resources
- Commercial Incident Response Service Providers
- Antivirus Products
- Mailing Lists and Newsgroups
- U.S. Government Resources
- Training, Conferences, and Certification Programs
- Legal Resources
Caractéristiques techniques
PAPIER | |
Éditeur(s) | O'Reilly |
Auteur(s) | Kenneth R. Van Wyk, Richard Forno |
Parution | 01/08/2001 |
Nb. de pages | 216 |
Format | 17,6 x 23,3 |
Couverture | Broché |
Poids | 336g |
Intérieur | Noir et Blanc |
EAN13 | 9780596001308 |
ISBN13 | 978-0-59600-130-8 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet