Chapter Four – Incident Response Tools

Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

Read More

Any discussion of incident response deserves a close look at the tools that you’ll need for effective incident detection, triage, containment and response. We’ll cover the best tools for each function, we’ll share resources for how to learn how and when to use them, and we’ll explain how to determine the attack source. That way, you’ll know the right decision to make at each stage of the investigation.

The Three A’s of Incident Response

In order to be effective in defending your company’s network, you’ll need the right Ammunition, you’ll aspire to identify proper Attribution, and you’ll focus on increasing Awareness as a way to reduce the volume and impact of cyber incidents on your company. Still not clear on the A’s? Read on…

AMMUNITION: Most incident responders will want to spend most of their time here, downloading and customizing incident response tools – open source as well as proprietary. Why? Because it’s fun, and that’s what cyber geeks tend to like to do… code. We’ll mostly cover open source incident response tools in this chapter, and we’ll also use the OODA loop framework from Chapter Two so you’ll know when to use which tool and why.

ATTRIBUTION: Understanding where an attack is coming from can help you understand an attacker’s intention as well as their technique, especially if you use real-time threat intelligence to do so. We’ll cover the basics of attribution, and include some free and open resources to keep you updated on who might be attacking your company based on the latest collaborative threat intelligence.

AWARENESS: The most fundamental security control is an educated and aware user. While we plan to go deep into incident response training in the next chapter, in this chapter we’ll cover some of the highlights you’ll want to consider as you update your security awareness program. The biggest takeaway here is that every incident should be examined as a way to improve your overall security program, with awareness as a key part of that.

Read More

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
About AlienVault
AlienVault is simplifying the way organizations detect and respond to today’s ever evolving threat landscape. Our unique, award-winning approach combines the essential security controls of our all-in-one Unified Security Management platform with the power of AlienVault’s Open Threat Exchange, the world’s largest crowd-sourced threat intelligence community, making effective and affordable threat detection attainable for resource-constrained IT teams.
Promoted Content
Beginner’s Guide to Threat Intelligence
A major recent trend in the security marketplace is to invest in some form of threat intelligence service to close the security knowledge gap and better focus scarce IT resources. But if you ask ten people what threat intelligence is, you will get ten different answers. In this AlienVault beginner's guide, you'll learn about: - Different threat intelligence sources - Why threat intelligence is critical for threat detection - The benefits of threat intelligence - How to generate threat intelligence - AlienVault's approach to threat intelligence Download this paper today to learn what threat intelligence is, what it is not, and why it is critical for organizations of all sizes to improve their threat detection, prioritization, and response capabilities.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?