Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Incident Response in the Age of Cloud
  • Table Of Contents Toc
  • Feedback & Rating feedback
Incident Response in the Age of Cloud

Incident Response in the Age of Cloud

By : Dr. Erdal Ozkaya
4.6 (16)
close
close
Incident Response in the Age of Cloud

Incident Response in the Age of Cloud

4.6 (16)
By: Dr. Erdal Ozkaya

Overview of this book

Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Table of Contents (18 chapters)
close
close
Free Chapter
2
Incident Response – Evolution and Current Challenges
In Progress | 0 / 7 sections completed | 0%
5
Methods and Tools of Incident Response Processes
In Progress | 0 / 8 sections completed | 0%
9
Incident Response on Multiple Platforms
In Progress | 0 / 7 sections completed | 0%
15
Ask the Experts
In Progress | 0 / 6 sections completed | 0%
16
Other Books You May Enjoy
In Progress | 0 / 1 sections completed | 0%
17
Index
In Progress | 0 / 1 sections completed | 0%

Reporting on mobile devices

Recently, cyber criminals have realized that one of the best methods available to target mobile users is to use phishing attacks on them. It is a challenging issue for individuals to identify an advanced phishing attack on a desktop; however, it's even more difficult on mobile devices. According to research published in CyberScoop, phishing attacks against mobile users rise 85 percent annually, and it is much more problematic to identify "phishing attacks on mobile devices compared to a desktop computer which puts the most important device in people's lives at a distinct disadvantage. As a result, mobile users are historically more likely to fall for phishing attacks."

The CyperScoop article, Phishing Attacks Against Mobile Devices Rise 85 Percent Annually can be found at https://www.cyberscoop.com/phishing-attacks-mobile-devices-lookout/.

There are many phishing methods that criminals use on mobile users, such...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY