Incident Response, Chapter 2

Introduction to the Incident Response Process
by Chris Prosise, Kevin Mandia, and Matt Pepe

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

    Requires Free Membership to View

Written by FBI insiders, this book offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including chapters on forensic analysis and remediation, and real-world case studies. It further describes how to counteract and conquer today's hack attacks.

Chapter 2 addresses some basic questions about incident response: What is meant by a computer security incident, what are the goals of incident response, and who is involved in the incident response process. It continues by delving into the specifics of the incident response methodology.

This chapter is posted in full as a pdf file. To continue reading, click here.

Click here for ordering information.

This was first published in July 2003

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.