-
作者卡巴斯基 Kaspersky
-
简介
- About this guide
- Terms and definitions
- Incident Response Basics
- Attack lifecycle (kill chain)
- Incident response steps
- Recommended IR process and rules
- Preparation
- Identification
- Incident triggers
- Prioritization guidelines
- Analyzing incidents in SIEM
- Containment
- Eradication
- Recovery
- Lessons learned
- Incident response example
- The attack plan
- The incident response
- Preparation (example)
- Identification (example)
- Containment (example)
- Eradication and Recovery (example)
- Lessons learned (example)
- Recommended tools and utilities
- Tools for collecting IOC
- Sysinternals utilities
- Tools for creating dumps
- GRR Rapid Response
- Forensic Toolkit
- dd utility
- Belkasoft RAM Capturer
- Tools for analysis
- Kaspersky Threat Intelligence Portal
- Tools for analyzing memory dumps
- Tools for analyzing hard disk dumps
- Strings utility
- Tools for eradication
- Kaspersky Virus Removal Tool
- Kaspersky Rescue Disk
- Tools for collecting IOC
- AO Kaspersky Lab
- Trademark notices
- About this guide
-
援引http://m.bobao.360.cn/learning/detail/4330.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2017-10-30 15:02:09
-
2020-10-16 03:06:47.800272
-
2018-06-05 13:43:16
-
2020-10-12 13:11:21.201403