-
作者卡巴斯基 Kaspersky
-
简介
- About this guide
- Terms and definitions
- Incident Response Basics
- Attack lifecycle (kill chain)
- Incident response steps
- Recommended IR process and rules
- Preparation
- Identification
- Incident triggers
- Prioritization guidelines
- Analyzing incidents in SIEM
- Containment
- Eradication
- Recovery
- Lessons learned
- Incident response example
- The attack plan
- The incident response
- Preparation (example)
- Identification (example)
- Containment (example)
- Eradication and Recovery (example)
- Lessons learned (example)
- Recommended tools and utilities
- Tools for collecting IOC
- Sysinternals utilities
- Tools for creating dumps
- GRR Rapid Response
- Forensic Toolkit
- dd utility
- Belkasoft RAM Capturer
- Tools for analysis
- Kaspersky Threat Intelligence Portal
- Tools for analyzing memory dumps
- Tools for analyzing hard disk dumps
- Strings utility
- Tools for eradication
- Kaspersky Virus Removal Tool
- Kaspersky Rescue Disk
- Tools for collecting IOC
- AO Kaspersky Lab
- Trademark notices
- About this guide
-
援引http://m.bobao.360.cn/learning/detail/4330.html
-
提示本站仅做资料的整理和索引,转载引用请注明出处
相关推荐
-
2017-11-19 02:40:46
-
2018-08-19 13:05:56
-
2018-01-03 15:21:56
-
2016-09-03 12:49:32