Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Incident Response in the Age of Cloud
  • Table Of Contents Toc
Incident Response in the Age of Cloud

Incident Response in the Age of Cloud

By : Dr. Erdal Ozkaya
4.6 (16)
close
close
Incident Response in the Age of Cloud

Incident Response in the Age of Cloud

4.6 (16)
By: Dr. Erdal Ozkaya

Overview of this book

Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Table of Contents (18 chapters)
close
close
16
Other Books You May Enjoy
17
Index

Key Metrics for Incident Response

Currently, organizations are facing a huge number of security incidents, where hackers exploit flaws in cybersecurity defenses in order to breach networks, systems, and users. One clear result of this is the immense costs that organizations have to deal with once they are hacked. These costs are attributed to multiple factors, such as direct theft by hackers and extortion, alongside indirect costs from employee turnover, loss of brand reputation, and fines. Therefore, there is much at stake, and this has pushed organizations to increase their focus on security, particularly Incident Response (IR).

The IR process as a whole can be hard to track since it is widely scoped and involves many processes and individuals. However, to ensure that an organization's security goals are met and that its overall security stature is continually improved, security and IT teams need to measure the performance of IR efforts. A common approach to measuring...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Incident Response in the Age of Cloud
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon