Advanced Persistent Threat by Eric Cole
Author:Eric Cole
Language: eng
Format: epub, pdf
ISBN: 9781597499552
Publisher: Elsevier Inc.
Published: 2013-01-27T16:00:00+00:00
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order to make sure that we are using consistent terminology, the following terms will be used throughout this section:
• Event—An observable occurrence or activity that is being performed. The easiest way to think of an event is an entry in a log file. Logs typically store events and become the key evidence in proving what has happened on a system. This is the reason why protection and control of the log files is so important is because they contain the events.
• Incident—An adverse event resulting in harm or the threat of an adverse event that could cause potential harm to computer systems or data. Anything that impacts or could impact a system falls under an incident. It is important to remember that intent does not matter. Both an APT breaking into a system and a pipe breaking and flooding your data center would be considered an incident.
• Incident Response (IR)—Actions taken subsequent to an incident to understand the incident and take remedial action. The key theme of security is prevention is ideal but detection is a must. Incident response focuses in on once an attack is detected, assessing the damage, responding and recovering back to normal operation. If normal operations are interrupted when an incident occurs, IR focuses on recovery and getting the organization back up and running.
• Computer Forensics—The science of analyzing, finding, and presenting digital evidence in court. One of the key steps of incident response is to figure out what happened. Discovering evidence is critical to determining what happening and for making a case in court to prove your side in order to get a favorable ruling. Forensics focuses in on making sure you have the information you need to determine and prove what happened.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6429)
Kotlin in Action by Dmitry Jemerov(5077)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3884)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2878)
The Art Of Deception by Kevin Mitnick(2616)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2392)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2318)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2143)
DarkMarket by Misha Glenny(2087)
Wireless Hacking 101 by Karina Astudillo(2084)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2029)
