Incident Response, Chapter 2

Introduction to the Incident Response Process

Introduction to the Incident Response Process
by Chris Prosise, Kevin Mandia, and Matt Pepe

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the

book, click here.

Written by FBI insiders, this book offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including chapters on forensic analysis and remediation, and real-world case studies. It further describes how to counteract and conquer today's hack attacks.

Chapter 2 addresses some basic questions about incident response: What is meant by a computer security incident, what are the goals of incident response, and who is involved in the incident response process. It continues by delving into the specifics of the incident response methodology.

This chapter is posted in full as a pdf file. To continue reading, click here.

Click here for ordering information.

This was first published in July 2003

Dig deeper on Network Security Best Practices and Products

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close