Crafting the InfoSec Playbook Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

Security Monitoring and Incident Response Master Plan

Jeff Bollinger und andere
    • 43,99 €
    • 43,99 €

Beschreibung des Verlags

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.
Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase

GENRE
Computer und Internet
ERSCHIENEN
2015
7. Mai
SPRACHE
EN
Englisch
UMFANG
276
Seiten
VERLAG
O'Reilly Media
ANBIETERINFO
OREILLY MEDIA INC
GRÖSSE
10,1
 MB
CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
2023
Cybersecurity All-in-One For Dummies Cybersecurity All-in-One For Dummies
2023
Threat Modeling Threat Modeling
2014
The InfoSec Handbook The InfoSec Handbook
2014
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
2020
Foundations of Information Security Foundations of Information Security
2019