Компьютерно-техническая экспертиза

Книги

Effective Incident Response Team

Effective Incident Response Team By Julie Lucas, Brian Moeller Paperback / September 2003 / 0201761750 Table of Contents Copyright Foreword Preface Some Notes of Thanks Chapter 1. Welcome to the Information Age A Brief History What Does This Mean to My Organization? Examples of Incident Response Teams Some Statistics Summary Chapter 2. What's Your Mission? Focus and Scope Working with Law Enforcement Operational Strategy Services Offered The Importance of Credibility Summary Chapter 3. The Terminology Piece What Is a Computer Incident? An Incident Taxonomy Common Vulnerability and Exposure (CVE) Project Summary Chapter 4. Computer Attacks Consequences of Computer Attacks Attack Vectors Malicious Logic Summary Chapter 5. Forming the Puzzle Putting the Team Together Facilities Products and Tools Funding the Team Training Marketing the Team Dealing with the Media Summary Chapter 6. Teamwork External Team Members Internal Teamwork Summary Chapter 7. Selecting the Products and Tools Training as a Tool Sound Security Practices The Tools of the Trade Using the Tools Summary Chapter 8. The Puzzle in Action The Life Cycle of an Incident Incident Reporting Keeping Current Writing Computer Security Advisories Summary Chapter 9. What Did That Incident Cost? Statistics and Cases Forms of Economic Impact An Incident Cost Model Summary Chapter 10. The Legal Eagles Working with the Legal Community Needed—Case Law Reporting Computer Crime Summary Chapter 11. Computer Forensics: An Evolving Discipline The World of Forensics Overview and Importance of Computer Forensics Summary Chapter 12. Conclusions Appendix A. Sample Incident Report Form Appendix B. Federal Code Related to Cyber Crime 18 U.S.C. 1029. Fraud and Related Activity in Connection with Access Devices 18 U.S.C. 1030. Fraud and Related Activity in Connection with Computers: As amended October 11, 1996 18 U.S.C. 1362. Communication Lines, Stations, or Systems Appendix C. Sample Frequently Asked Questions Appendix D. Domain Name Extensions Used for Internet Addresses Appendix E. Well-Known Port Numbers Glossary Bibliography Books Reports and Articles Web Sites

Прикрепленные файлы

Оценить статью: