Muutke küpsiste eelistusi

E-raamat: What To Do When You Get Hacked: A Practitioner's Guide to Incident Response in the 21st Century [Taylor & Francis e-raamat]

  • Formaat: 176 pages, 3 Tables, black and white; 8 Line drawings, black and white; 8 Illustrations, black and white
  • Ilmumisaeg: 16-Nov-2022
  • Kirjastus: CRC Press
  • ISBN-13: 9781003264293
  • Taylor & Francis e-raamat
  • Hind: 110,79 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 158,27 €
  • Säästad 30%
  • Formaat: 176 pages, 3 Tables, black and white; 8 Line drawings, black and white; 8 Illustrations, black and white
  • Ilmumisaeg: 16-Nov-2022
  • Kirjastus: CRC Press
  • ISBN-13: 9781003264293

What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.



This book teaches you everything that you need to know about preparing your company for a potential data breach. It is meant for the everyday business owner and makes these concepts simple to understand and apply.

Chapter 1 What Is the Cybersecurity Epidemic?
1(6)
Why Is Cybersecurity Such A Big Deal?
1(1)
What Does Organized Computer Hacking Look Like?
2(1)
What Does This Mean For The Average Business?
3(2)
Stock Prices
3(1)
Suspended Business Operations
4(1)
Loss of Customers
4(1)
Compliance Fees
4(1)
Cyber Insurance Costs
4(1)
Lawsuits
5(1)
Recap
5(2)
Chapter 2 What Am I Defending My Company from?
7(8)
Social Engineering
7(2)
Malware
8(1)
Advanced Persistent Threats
8(1)
Insider Threats
9(1)
Who Are The Threat Actors?
9(2)
Types of Hackers
9(2)
What Exactly Do The Hackers Want?
11(3)
Recap
14(1)
Chapter 3 How to Get Started with Your Cybersecurity Program
15(10)
What Is A Cybersecurity Program?
15(2)
How To Get Started Creating Your Cybersecurity Program?
17(2)
Types Of Security Controls
19(4)
Control Categories
19(1)
Preventative Controls
19(1)
Detective Controls
20(1)
Deterrent Controls
21(1)
Recovery Controls
22(1)
Recap
23(2)
Chapter 4 Why Do You Need Cyber Insurance?
25(8)
What Is Cyber Insurance?
25(1)
What Does Cyber Insurance Cover?
26(1)
What Are The Types Of Cyber Insurance?
26(1)
What To Look For When Buying Cyber Insurance
27(1)
How Do Cyber Insurers Assess Companies?
28(2)
How To Make A Business Case For Cyber Insurance
30(1)
Recap
30(3)
Chapter 5 Compliance Regulations You Need to Be Aware of
33(8)
Why Is Meeting Compliance Important?
34(2)
Gdpr Enforcement
36(4)
Recap
40(1)
Chapter 6 How to Be Prepared for Insider Threats
41(6)
The Principle Of Least Privilege
42(1)
Segregation Of Duties
42(1)
Mandatory Vacations
43(1)
Develop A Good Employee Termination Procedure
43(1)
Have Proper Surveillance
44(1)
Have Proper Backups And Recovery Processes
44(1)
Keep Track Of Employee Access
44(1)
Monitor Your Network For Suspicious Activity
44(1)
Have Well-Developed Policies For Proper User Behavior
45(1)
Employee Training
45(1)
Security Awareness Training
45(1)
Recap
46(1)
Chapter 7 How to Build an Effective Incident Response Team
47(18)
Nist Incident Response Lifecycle
47(2)
Incident Response Lifecycle SP 800-61
47(2)
Building Out The Incident Response Team
49(3)
Roles and Responsibilities
49(2)
Documentation and Playbooks
51(1)
How To Interview For Your Incident Response Team
52(2)
30 Sample Interview Questions
54(7)
Junior Level
54(3)
Mid-Level
57(2)
Senior Level
59(2)
Required Software Tools
61(2)
Recap
63(2)
Chapter 8 How to Pitch for a Quality Cybersecurity Budget
65(8)
Quantifying Roi
65(1)
Four Areas Of Roi In Cybersecurity
66(1)
Tips For Communicating Roi To Upper Management
67(1)
Have Accurate Accounting For Your Team
68(1)
Using Industry Statistics
69(2)
Recap
71(2)
Chapter 9 Why You Need Continuous Security Validation
73(8)
Why Continuous Security Validation Is Important
73(3)
Emulation versus Simulation
75(1)
How To Implement Security Validation Using Bug Bounty Programs
76(3)
Advantages
76(2)
Types of Bug Bounty Programs
78(1)
Why You Should Still Do Manual Tests
79(1)
Recap
79(2)
Chapter 10 The Importance of Routine Simulations
81(8)
Types Of Situations You Need To Prepare For
82(2)
Types Of Security Testing/Simulations That You Can Do
84(1)
Tabletop Exercise
84(1)
Structured Walk Through
84(1)
Simulation Testing
84(1)
Parallel Test
84(1)
Cutover Test
85(1)
Levels Of Security Testing
85(1)
Data Verification
85(1)
Database Mounting
85(1)
Single Machine Boot Verification
85(1)
Runbook Testing
85(1)
Recovery Assurance
85(1)
Disaster Recovery Testing Best Practices
86(1)
Test Regularly
86(1)
Use the Feedback from the Simulations
86(1)
Have Clear Goals
86(1)
Outsource if Necessary
86(1)
Recap
87(2)
Chapter 11 The Six Steps to Preparing for a Cybersecurity Incident
89(8)
Incident Handler Communication
90(2)
Hardware And Software Analysis
92(1)
Hardening Your Systems For Preventing Incidents
93(4)
System Hardening
93(2)
Network Hardening Tips
95(2)
Chapter 12 How to Analyze a Potential Cybersecurity Incident
97(6)
Identifying Iocs
97(2)
Examples of Indicators of Compromise, Courtesy of Dark Reading
98(1)
Understand The Scope And Severity
99(1)
Understand Who You Need To Communicate With
100(1)
Identify Notification Requirements
100(1)
Recap
101(2)
Chapter 13 Steps to Containing a Cybersecurity Incident
103(4)
Isolate Any Infected Accounts And Machines
103(2)
Recap
105(2)
Chapter 14 How to Eradicate and Recover from a Cybersecurity Incident
107(6)
Eradication Phase
107(1)
How To Clean Malware Off Of A Machine
107(3)
Prerequisites
108(1)
Step 1 Disconnect from the Internet
108(1)
Step 2 Make an Image of the Machine in Its Original State
108(1)
Step 3 Enter Safe Mode
108(1)
Step 4 Refrain from Logging into any Accounts
108(1)
Step 5 Clear Your Cache and Delete Temporary Files
109(1)
Step 6 Malware Removal Techniques
109(1)
Recovery Phase
110(3)
Recap
110(3)
Chapter 15 What to Do If You Don't Have the Internal Expertise You Need
113(8)
Potential Benefits Of Outsourcing Cybersecurity
114(1)
Potential Cons Of Outsourcing Cybersecurity
115(1)
How To Outsource Cybersecurity Effectively
115(1)
Cybersecurity Operations You Should Consider Outsourcing
116(3)
Recap
119(2)
Chapter 16 How to Handle Third-Party Vendors That Have Suffered a Data Breach
121(6)
How You Can Mitigate Your Third-Party Risks
123(2)
Recap
125(2)
Chapter 17 How to Remove Data Leaks Once They Are on the Internet
127(10)
How To Remove Data Leaks On Github
128(1)
Truffle Hog
128(1)
GitSecrets
128(1)
GitHub Secret Scanning
128(1)
GitLeaks
129(1)
SpectralOps
129(1)
GitGuardian
129(1)
How To Get A Github Data Leak Removed
129(1)
How To Prevent Data Leaks On Github
130(1)
Educate Your Developers
130(1)
Use Fake Data
131(1)
Use a Monitoring Service or Tool
131(1)
What Happens If Someone Posts Your Company's Data Online?
131(1)
Contact the Owner of the Forum/Website
131(1)
Submit a Request with Google
132(1)
Report the Website to Law Enforcement or the Web Hosting Provider
132(1)
How To Prevent Someone From Posting Your Data Online
132(2)
Protect Your Data
132(1)
Anonymize Client Information
133(1)
What Happens If Someone Steals My Domain?
134(1)
What To Do About A Squatted Domain
134(1)
How To Prevent Domain Squatting
135(1)
Register the Domain Before You Need It
135(1)
Register Similar Names
135(1)
Purchase Domain Ownership Protection
135(1)
Register a Trademark
135(1)
Be the Owner on Record
135(1)
Recap
136(1)
Chapter 18 How to Address the Public During a Data Breach
137(4)
Understand Your Reporting Obligations
138(1)
How To Deal With The Media
138(2)
Recap
140(1)
Chapter 19 How to Handle Disgruntled Customers During a Data Breach
141(4)
Recap
144(1)
Chapter 20 When Should I Get Law Enforcement Involved?
145(6)
Law Enforcement Versus Private Consultants
148(1)
When Do You Have A Legal Obligation To Report A Data Breach To The Police?
148(1)
Recap
148(3)
Chapter 21 Public Authorities You Should Notify Throughout a Data Breach
151(8)
Us Department Of Health And Human Services
151(1)
Breaches Affecting Fewer Than 500 Individuals
152(1)
Breaches Affecting 500 Or More Individuals
152(1)
Reporting A Data Breach To Ico
153(1)
When Do You Need To Notify Individuals About A Data Breach?
154(1)
When Do You Need To Report A Breach?
155(1)
How To Submit A Breach Report To The Opc And Affected Individuals
156(1)
Recap
157(2)
Conclusion
159(14)
Top 10 Key Cybersecurity Concepts To Remember
159(10)
Personally Identifiable Information (PII)
159(1)
Cyber Insurance
159(1)
The Principle of Least Privilege
160(1)
The Incident Response Lifecycle
160(1)
Quantifying the ROI of Cybersecurity
160(2)
Security Simulations to Prepare for a Hack
162(1)
Remember Third-Party Risks
163(1)
Compliance and Notification Requirements
164(3)
What Do You Need in an Incident Response Team?
167(2)
Defense in Depth
169(1)
Final Thoughts
169(1)
Available Resources
170(3)
Sources 173(2)
Index 175
Shimon Brathwaite is author and editor-in-chief of securitymadesimple.org, a website dedicated to teaching business owners how to secure their businesses and helping cybersecurity professionals start and advance their careers. Before starting his career in Cybersecurity, Shimon was a co-op student at Ryerson University in Toronto, Canada, where he got a degree in Business Technology Management before deciding to specialize in Cybersecurity. Through his work at Ryerson University and his work after graduation, he has accumulated over 5 years of work experience in Cybersecurity across financial institutions, startups, and consulting companies. His work has primarily been in incident response and helping companies resolve security incidents, which is where he learned that most security incidents are caused by only a handful of problems. This is the premise for the book that you are about to read. If you want to continue to get cybersecurity tips and tricks for free and know when his next book comes out, please visit his website at https://www.securitymadesimple.org/, where you can find new content every week.