• Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture
  Keith E. Anderson, Sr.

incident response and computer network forensics​

Picture
Information Age (2018). Incident response: Crucial for cyber security preparedness
For an organization, building-out an incident response program is a key component to establishing a level of cyber resiliency that ensures the capabilities exist to bounce back from a security event, incident, and/or breach. The key to a successful incident response function is to build the program with the business in mind:
  • anchor policies, plans, and procedures to an industry standard or framework (i.e. NIST, ISO, etc...)
  • ensure there's sufficient awareness and education for all impacted users
  • build-out an internal security incident response team (SIRT), and test-out the process by leveraging table-top exercises
  • ensure the proper controls are in place to detect (and respond to) behavior in the environment that is anomalous or atypical
  • bake-in funding for retainers of specialized skillsets in the event of a critical situation (i.e. a Cyber Incident Forensics and Response (CIFR) team)
Picture
NIST (2012). Computer Security Incident Handling Guide
Capstone Updated - Computer Forensic Examination Report
File Size: 244 kb
File Type: docx
Download File

Reflection
What is Incident Response
SANS - Incident Handler's Handbook
NIST and SANS Incident Response Comparison
NIST - Computer Security Incident Handling Guide
Incident response: Crucial for cyber security preparedness
Powered by Create your own unique website with customizable templates.
  • Home
  • Cryptography
  • Cyber Security Fundamentals
  • Cyber Threat Intelligence
  • Incident Response and Computer Network Forensics
  • Management and Cyber Security
  • Network Visualization and Vulnerability Detection
  • Operational Policy
  • Reference Link Library
  • Risk Management
  • Secure Software Design and Development
  • Security Architecture