Any good attacker will tell you that expensive security monitoring and prevention tools aren?t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You?ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco?s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals?and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase Printed Pages: 300. Buchnummer des Verkäufers 92946
Titel: Crafting the InfoSec Playbook: Security ...
Verlag: Shroff Publishers & Distributors Pvt. Ltd.
Buchbeschreibung O'reilly UK Ltd. Jun 2015, 2015. Taschenbuch. Buchzustand: Neu. Neuware - This book demonstrates how to boil down complex security monitoring and incident response ideas into their most basic elements. Using a data-centric approach, the authors share how to create your own unique incident detection strategy, how to keep your ideas and methods fresh, how to discover and develop your own threat intelligence, how to get the most out of participating in the security community, and how to compete against the malicious actors already attacking your network. Most Information Security books tend to fall into the same trap of spending page after page describing how to configure open-source security software packages, or drone on about various configuration options replete with screenshots. This book focuses on strategy and technique, and is intended to give those in the know - as well as those just getting started - practical advice and examples of not just how to install and configure tools, but how to strategically use them in real-world settings. 253 pp. Englisch. Artikel-Nr. 9781491949405