did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780201761757

Computer Incident Response Puzzle : A Guide to Forming an Incident Response Team

by ;
  • ISBN13:

    9780201761757

  • ISBN10:

    0201761750

  • Format: Paperback
  • Copyright: 2004-01-01
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
List Price: $39.99

Summary

When an intruder, worm, virus, or automated attack persists in targeting a computer system, having specific controls in place and a plan of action for responding to the attack or computer incident can greatly reduce the resultant costs to an organization. The implementation of a Computer Incident Response Team, whether it's formed with internal or external resources, is one safeguard that can have a large return on investment during a crisis situation.This book serves as a guide to anyone contemplating or being tasked with forming a Computer Incident Response Team. The creation of such a team is not a trivial matter and there are many issues that must be addressed up front to help ensure a smooth implementation. This book will try to identify most of these issues to help with the creation process. Once the team is formed and operational, this guide will continue to serve as a resource while the team evolves to respond to the ever changing types of vulnerabilities.**Foreword by Steve Romig, Manager, Network Security Group, Ohio State University.**

Author Biography

Brian Moeller is a senior security engineer for Ohio State University's Incident Response Team.

Table of Contents

Forewordp. xiii
Prefacep. xvii
Welcome to the Information Agep. 1
A Brief Historyp. 2
CERTp. 3
More Teamsp. 5
Firstp. 5
What Does This Mean to My Organization?p. 7
Examples of Incident Response Teamsp. 7
Some Statisticsp. 8
Summaryp. 11
What's Your Mission?p. 13
Focus and Scopep. 13
Know Who You're Protecting: Defining Your Constituencyp. 14
Defining Responsep. 15
Working with Law Enforcementp. 17
InfraGardp. 19
Operational Strategyp. 20
Defining an Incidentp. 21
Tracking an Incidentp. 21
Counting Incidentsp. 23
Services Offeredp. 24
The Importance of Credibilityp. 27
Summaryp. 28
The Terminology Piecep. 29
What Is a Computer Incident?p. 29
Operational Versus Security Incidentsp. 39
Determining the Categories to Be Usedp. 40
An Incident Taxonomyp. 42
Common Vulnerability and Exposure (CVE) Projectp. 50
Summaryp. 52
Computer Attacksp. 55
Consequences of Computer Attacksp. 57
Computer Intrusion, Unauthorized Access, or Compromisep. 57
Denial-of-Service Attacksp. 59
Port Scans or Probesp. 59
Attack Vectorsp. 60
The Human Factorp. 60
TCP/IP Design Limitationsp. 65
Coding Oversightp. 66
Malicious Logicp. 68
The Computer Virusp. 68
Virus Typesp. 70
Important Steps to Remain Virus-Freep. 72
Other Forms of Malicious Logicp. 72
Virus Hoaxes and Urban Legendsp. 74
Summaryp. 76
Forming the Puzzlep. 79
Putting the Team Togetherp. 80
Coverage Optionsp. 80
Determining the Best Coveragep. 84
Team Rolesp. 85
Team Skillsp. 88
Promotions and Growthp. 95
Interviewing Candidatesp. 96
Facilitiesp. 97
Products and Toolsp. 99
Penetration Testing Toolsp. 99
Intrusion Detection Systemsp. 101
Network Monitors and Protocol Analyzersp. 103
Forensics Toolsp. 103
Other Toolsp. 105
Funding the Teamp. 106
Marketing Campaignp. 107
Risk Assessmentp. 108
Business Casep. 109
Placement of the Teamp. 109
Worst-Case Scenariosp. 110
Trainingp. 110
Certificationsp. 112
Constituency Trainingp. 116
Marketing the Teamp. 116
Dealing with the Mediap. 118
Summaryp. 120
Teamworkp. 121
External Team Membersp. 122
Internal Teamworkp. 125
Selecting Team Membersp. 125
Retention and Cohesivenessp. 126
Summaryp. 128
Selecting the Products and Toolsp. 129
Training as a Toolp. 129
Sound Security Practicesp. 131
The Tools of the Tradep. 138
Using the Toolsp. 141
Summaryp. 142
The Puzzle in Actionp. 143
The Life Cycle of an Incidentp. 144
Preparation (Preparing for Compromise)p. 146
Incident Identificationp. 153
Notificationp. 156
Incident Analysisp. 159
Remediationp. 161
System Restorationp. 165
Lessons Learnedp. 166
Sample Incidentsp. 168
Incident Reportingp. 171
Feedbackp. 172
Tracking Incidentsp. 174
Keeping Currentp. 177
Writing Computer Security Advisoriesp. 178
Summaryp. 180
What Did That Incident Cost?p. 183
Statistics and Casesp. 184
CSI/FBI Survey Resultsp. 184
Some Example Casesp. 184
Forms of Economic Impactp. 189
Costs Associated with Time Framesp. 189
Tangible Versus Intangible Costsp. 191
An Incident Cost Modelp. 193
Summaryp. 199
The Legal Eaglesp. 201
Working with the Legal Communityp. 202
The Need for Legal Assistancep. 202
Establishing Contactsp. 203
Laws Pertaining to Computer Crimep. 204
Needed--Case Lawp. 208
Reporting Computer Crimep. 209
Summaryp. 213
Computer Forensics: An Evolving Disciplinep. 215
The World of Forensicsp. 215
What Is Forensics?p. 215
The Forensics Investigationp. 217
Overview and Importance of Computer Forensicsp. 221
Computer Forensics Challengesp. 221
Computer Evidencep. 223
Methodologiesp. 227
Educationp. 231
Summaryp. 231
Conclusionsp. 233
Sample Incident Report Formp. 239
Federal Code Related to Cyber Crimep. 243
18 U.S.C. 1029. Fraud and Related Activity in Connection with Access Devicesp. 243
18 U.S.C. 1030. Fraud and Related Activity in Connection with Computers: As amended October 11, 1996p. 248
18 U.S.C. 1362. Communication Lines, Stations, or Systemsp. 255
Sample Frequently Asked Questionsp. 257
Domain Name Extensions Used for Internet Addressesp. 263
Well-Known Port Numbersp. 283
Glossaryp. 285
Bibliographyp. 291
Indexp. 295
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program