Problem solve Get help with specific problems with your technologies, process and projects.

Incident Response, Chapter 2

Introduction to the Incident Response Process

Introduction to the Incident Response Process
by Chris Prosise, Kevin Mandia, and Matt Pepe

This excerpt is reprinted with permission from McGraw-Hill, copyright 2003. For more information or to order the book, click here.

Written by FBI insiders, this book offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including chapters on forensic analysis and remediation, and real-world case studies. It further describes how to counteract and conquer today's hack attacks.

Chapter 2 addresses some basic questions about incident response: What is meant by a computer security incident, what are the goals of incident response, and who is involved in the incident response process. It continues by delving into the specifics of the incident response methodology.

This chapter is posted in full as a pdf file. To continue reading, click here.

Click here for ordering information.

This was last published in July 2003

Dig Deeper on Network Security Best Practices and Products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.