Digital Forensics and Incident Response - Second Edition
暫譯: 數位鑑識與事件回應 - 第二版

Johansen, Gerard

相關主題

商品描述

An understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response.

After focusing on the fundamentals of incident response that are critical to any information security team, you’ll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You’ll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you’ll discover the role that threat intelligence plays in the incident response process. You’ll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting.

By the end of this book, you’ll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization.

  • Create and deploy an incident response capability within your own organization
  • Perform proper evidence acquisition and handling
  • Analyze the evidence collected and determine the root cause of a security incident
  • Become well-versed with memory and log analysis
  • Integrate digital forensic techniques and procedures into the overall incident response process
  • Understand the different techniques for threat hunting
  • Write effective incident reports that document the key findings of your analysis
  • Create a solid incident response framework and manage cyber incidents effectively
  • Perform malware analysis for effective incident response
  • Explore real-life scenarios that effectively use threat intelligence and modeling techniques

商品描述(中文翻譯)

了解數位鑑識如何與整體的網路安全事件響應整合,是保護您組織基礎設施免受攻擊的關鍵。本書的更新第二版將幫助您執行尖端的數位鑑識活動和事件響應。

在專注於任何資訊安全團隊至關重要的事件響應基本原則後,您將進一步探索事件響應框架。從理解其重要性到創建快速且有效的安全事件響應,本書將通過有用的範例指導您。接下來,您將熟悉數位鑑識技術,從證據獲取和檢查易失性記憶體,到硬碟檢查和基於網路的證據。隨著進展,您將發現威脅情報在事件響應過程中的角色。您還將學習如何準備事件響應報告,以記錄您的分析結果。最後,除了各種事件響應活動外,本書還將討論惡意軟體分析,並展示如何主動運用您的數位鑑識技能進行威脅獵捕。

在本書結束時,您將學會如何有效調查和報告您組織內的不當安全漏洞和事件。

- 在您自己的組織內建立和部署事件響應能力
- 執行適當的證據獲取和處理
- 分析收集的證據並確定安全事件的根本原因
- 熟悉記憶體和日誌分析
- 將數位鑑識技術和程序整合到整體事件響應過程中
- 理解不同的威脅獵捕技術
- 撰寫有效的事件報告,記錄您分析的關鍵發現
- 創建穩固的事件響應框架並有效管理網路事件
- 執行惡意軟體分析以進行有效的事件響應
- 探索有效利用威脅情報和建模技術的實際案例