Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover image
Title page
Table of Contents
Copyright
About the Author
About the Contributors
Acknowledgments
Chapter 1: An Overview of Data Breaches
Abstract
Introduction
What Is a Data Breach?
Lifecycle of a Breach
Sources of Data Breaches
Impact of a Data Breach
Historical Challenges With Breach Management
Summary
Chapter 2: Preparing to Develop a Computer Security Incident Response Plan
Abstract
Introduction
CSIR Plan Planning
Summary
Chapter 3: Developing a Computer Security Incident Response Plan
Abstract
Introduction
Developing the Data Breach Response Policy
CSIR Plan Validation and Testing
Summary
Chapter 4: Qualifying and Investigating a Breach
Abstract
Introduction
Invoking the CSIR Team
Critical First Responder Steps
Engaging and Managing Third Parties
Investigating the Suspected Breach
Confirming or Denying a Suspected Breach
Conclusion
Chapter 5: Containing a Breach
Abstract
Introduction
Breach Containment
Removing Posted Information From the Internet
Containing Compromised Systems
Summary
Chapter 6: Precisely Determining the Scope of a Breach
Introduction
Database Forensics Overview
Using Database Forensics in an Investigation
Database Forensic Tools
Connecting to the Database
Database Artifacts
Analyzing Database Artifacts
What Are You Trying to Accomplish With Your Investigation?
Summary
Chapter 7: Communicating Before, During and After a Breach
Abstract
Introduction: The Concept of Cyber Resilience
Before a Crisis
During a Crisis
After a Crisis
Chapter 8: Restoring Trust and Business Services After a Breach
Abstract
Introduction
The Difference Between Containment and Recovery
Recovering Your Environment
Certifying Your Environment
Restoring Business Services
Conducting a Breach Postmortem Review
Improving Cyber Security After a Breach
Creating a Cyber Defensible Position
Summary
Chapter 9: Preparing for Breach Litigation
Abstract
Introduction
Breach Litigation
From Claim to Settlement
The Volume of Breach Lawsuits
Preparing for Breach Litigation
Breaches and the Board
Summary
Appendix
Index
← Prev
Back
Next →
← Prev
Back
Next →