Home Page Icon
Home Page
Table of Contents for
SIRT Incident Report
Close
SIRT Incident Report
by David Kim, Michael Gregg
Inside Network Security Assessment: Guarding Your IT Infrastructure
Copyright
About the Author
Acknowledgments
We Want to Hear from You!
Reader Services
Introduction
Who Should Read This Book
Why We Created This Book
Overview of the Book’s Contents
Conventions Used in This Book
Introduction to Assessing Network Vulnerabilities
What Security Is and Isn’t
Process for Assessing Risk
Four Ways in Which You Can Respond to Risk
Network Vulnerability Assessment
Summary
Key Terms
Foundations and Principles of Security
Basic Security Principles
Security Requires Information Classification
The Policy Framework
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Encryption
Security and the Employee (Social Engineering)
Summary
Key Terms
Why Risk Assessment
Risk Terminology
Laws, Mandates, and Regulations
Risk Assessment Best Practices
Understanding the IT Security Process
The Goals and Objectives of a Risk Assessment
Summary
Key Terms
Risk-Assessment Methodologies
Risk-Assessment Terminology
Quantitative and Qualitative Risk-Assessment Approaches
Best Practices for Quantitative and Qualitative Risk Assessment
Choosing the Best Risk-Assessment Approach
Common Risk-Assessment Methodologies and Templates
Summary
Key Terms
Defining the Scope of the Assessment
Reviewing Critical Systems and Information
Compiling the Needed Documentation
Making Sure You Are Ready to Begin
Summary
Key Terms
Understanding the Attacker
Who Are the Attackers?
What Do Attackers Do?
Reducing the Risk of an Attack
How to Respond to an Attack
Summary
Key Terms
Performing the Assessment
Introducing the Assessment Process
Level I Assessments
Level II Assessments
Level III Assessments
Summary
Key Terms
Tools Used for Assessments and Evaluations
A Brief History of Security Tools
Putting Together a Toolkit
Determining What Tools to Use
Summary
Key Terms
Preparing the Final Report
Preparing for Analysis
Ranking Your Findings
Building the Final Report
Contents of a Good Report
Determining the Next Step
Audit and Compliance
Summary
Key Terms
Post-Assessment Activities
IT Security Architecture and Framework
Roles, Responsibilities, and Accountabilities
Security Incident Response Team (SIRT)
Vulnerability Management
Training IT Staff and End Users
Summary
Key Terms
Security Assessment Resources
Security Standards
General Security Websites
Security Tool Websites
Security Assessment Forms
Document Tracking Form
Critical Systems and Information Forms
Security Assessment Sample Report
Notice
Introduction
Statement of Work
Analysis
Conclusions
Procurement Terminology
Procurement Best Practices
SIRT Team Report Format Template
SIRT Incident Report
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
SIRT Incident Report
Index
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset