Using a well-conceived incident response plan in the aftermath of an
online security breach enables your team to identify attackers and
learn how they operate. But, only when you approach incident response
with a cyber threat intelligence mindset will you truly understand the
value of that information. With this practical guide, you’ll learn
the fundamentals of intelligence analysis, as well as the best ways to
incorporate these techniques into your incident response process. Each
method reinforces the other: threat intelligence supports and augments
incident response, while incident response generates useful threat
intelligence. This book helps incident managers, malware analysts,
reverse engineers, digital forensics specialists, and intelligence
analysts understand, implement, and benefit from this relationship. In
three parts, this in-depth book includes: The fundamentals: get an
introduction to cyber threat intelligence, the intelligence process,
the incident-response process, and how they all work together
Practical application: walk through the intelligence-driven incident
response (IDIR) process using the F3EAD process—Find, Fix Finish,
Exploit, Analyze, and Disseminate The way forward: explore big-picture
aspects of IDIR that go beyond individual incident-response
investigations, including intelligence team building
Les mer
Produktdetaljer
ISBN
9781491935194
Publisert
2017
Utgave
1. utgave
Utgiver
O'Reilly Media, Inc.
Språk
Product language
Engelsk
Format
Product format
Digital bok
Forfatter