Johansen, 2022 - Google Patents
Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat responseJohansen, 2022
- Document ID
- 7572329701046272039
- Author
- Johansen G
- Publication year
External Links
Snippet
Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key FeaturesCreate a solid incident response framework and manage cyber incidents …
- 230000004044 response 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Saxena et al. | Impact and key challenges of insider threats on organizations and critical businesses | |
Diogenes et al. | Cybersecurity-attack and defense strategies: Infrastructure security with red team and blue team tactics | |
Johnson et al. | Guide to cyber threat information sharing | |
Kent et al. | Guide to Computer Security Log Management:. | |
Kral | The incident handlers handbook | |
Johansen | Digital forensics and incident response | |
Arfeen et al. | Endpoint detection & response: A malware identification solution | |
Kalhoro et al. | Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review | |
Johnson | Computer incident response and forensics team management: Conducting a successful incident response | |
Johansen | Digital forensics and incident response: Incident response techniques and procedures to respond to modern cyber threats | |
Bollinger et al. | Crafting the InfoSec playbook: security monitoring and incident response master plan | |
Jaatun et al. | An empirical study of CERT capacity in the North Sea | |
Sehgal et al. | Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization | |
Casey et al. | Forensic analysis as iterative learning | |
Johansen | Digital Forensics and Incident Response: Incident response tools and techniques for effective cyber threat response | |
Harsch et al. | Assuming a state of compromise: A best practise approach for SMEs on incident response management | |
Kent et al. | Sp 800-92. guide to computer security log management | |
Groenewegen et al. | TheHive Project: The maturity of an open-source Security Incident Response platform | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Ozkaya | Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition) | |
Bayuk | CyberForensics: understanding information security investigations | |
Senapati et al. | Impact of information leakage and conserving digital privacy | |
Labossiere | A matrix for small business owners to better protect their network | |
Curiac et al. | Controlled information destruction: the final frontier in preserving information security for every organisation | |
Iakovleva et al. | Information Security Incident Handling Regulation |