BookShared
  • MEMBER AREA    
  • Intelligence-Driven Incident Response: Outwitting the Adversary

    (By Scott J. Roberts)

    Book Cover Watermark PDF Icon Read Ebook
    ×
    Size 27 MB (27,086 KB)
    Format PDF
    Downloaded 668 times
    Last checked 14 Hour ago!
    Author Scott J. Roberts
    “Book Descriptions: Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.

    Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.

    In three parts, this in-depth book includes:



    The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together

    Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process--Find, Fix Finish, Exploit, Analyze, and Disseminate

    The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building”

    Google Drive Logo DRIVE
    Book 1

    Dark Wire: The Incredible True Story of the Largest Sting Operation Ever

    ★★★★★

    Joseph Cox

    Book 1

    The Cybersecurity Manager's Guide: The Art of Building Your Security Program

    ★★★★★

    Todd Barnum

    Book 1

    Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers

    ★★★★★

    Andy Greenberg

    Book 1

    Active Measures: The Secret History of Disinformation and Political Warfare

    ★★★★★

    Thomas Rid

    Book 1

    The First 90 Days: Critical Success Strategies for New Leaders at All Levels

    ★★★★★

    Michael D. Watkins

    Book 1

    Visual Threat Intelligence: An Illustrated Guide For Threat Researcher

    ★★★★★

    Thomas Roccia

    Book 1

    Thinking, Fast and Slow

    ★★★★★

    Daniel Kahneman

    Book 1

    Chip War: The Fight for the World's Most Critical Technology

    ★★★★★

    Chris Miller

    Book 1

    The Murder on the Links (Hercule Poirot, #2)

    ★★★★★

    Agatha Christie

    Book 1

    Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency

    ★★★★★

    Andy Greenberg

    Book 1

    Ego Is the Enemy

    ★★★★★

    Ryan Holiday

    Book 1

    How to Do Nothing: Resisting the Attention Economy

    ★★★★★

    Jenny Odell