[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Johansen, 2022 - Google Patents

Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response

Johansen, 2022

Document ID
7572329701046272039
Author
Johansen G
Publication year

External Links

Snippet

Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key FeaturesCreate a solid incident response framework and manage cyber incidents …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Saxena et al. Impact and key challenges of insider threats on organizations and critical businesses
Diogenes et al. Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics
Johnson et al. Guide to cyber threat information sharing
Kent et al. Guide to Computer Security Log Management:.
Kral The incident handlers handbook
Johansen Digital forensics and incident response
Arfeen et al. Endpoint detection & response: A malware identification solution
Kalhoro et al. Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review
Johnson Computer incident response and forensics team management: Conducting a successful incident response
Johansen Digital forensics and incident response: Incident response techniques and procedures to respond to modern cyber threats
Bollinger et al. Crafting the InfoSec playbook: security monitoring and incident response master plan
Jaatun et al. An empirical study of CERT capacity in the North Sea
Sehgal et al. Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
Casey et al. Forensic analysis as iterative learning
Johansen Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response
Harsch et al. Assuming a state of compromise: A best practise approach for SMEs on incident response management
Kent et al. Sp 800-92. guide to computer security log management
Groenewegen et al. TheHive Project: The maturity of an open-source Security Incident Response platform
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Ozkaya Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition)
Bayuk CyberForensics: understanding information security investigations
Senapati et al. Impact of information leakage and conserving digital privacy
Labossiere A matrix for small business owners to better protect their network
Curiac et al. Controlled information destruction: the final frontier in preserving information security for every organisation
Iakovleva et al. Information Security Incident Handling Regulation