購物比價找書網找車網
FindBook  
 有 1 項符合

21st Century U.S. Military Documents: Cyber Incident Handling Program (Chairman of the Joint Chiefs of Staff Manual) - Computer Forensics, Malware and Network Analysis, CYBERCON

的圖書
21st Century U.S. Military Documents: Cyber Incident Handling Program (Chairman of the Joint Chiefs of Staff Manual) - Computer Forensics, Malware and Network Analysis, CYBERCON 21st Century U.S. Military Documents: Cyber Incident Handling Program (Chairman of the Joint Chiefs of Staff Manual) - Computer Forensics, Malware and Network Analysis, CYBERCON

作者:Progressive Management 
出版社:Progressive Management
出版日期:2013-11-13
語言:英文   
圖書選購
型式價格供應商所屬目錄
電子書
$ 235
樂天KOBO 樂天KOBO
工業與專業
圖書介紹 - 資料來源:樂天KOBO   評分:
圖書名稱:21st Century U.S. Military Documents: Cyber Incident Handling Program (Chairman of the Joint Chiefs of Staff Manual) - Computer Forensics, Malware and Network Analysis, CYBERCON

The Department of Defense maintains a comprehensive cyber incident handling program. This program ensures an integrated capability to continually improve the Department of Defense's ability to rapidly identify and respond to cyber incidents that adversely affect DoD information networks and information systems (ISs). It does so in a way that is consistent, repeatable, quality driven, measurable, and understood across DoD organizations. This provides requirements and methodology for establishing, operating, and maintaining a robust DoD cyber incident handling capability for routine response to events and incidents within the Department of Defense.

CYBER INCIDENT HANDLING PROGRAM * Introduction * Roles and Responsibilities * Computer Network Defense Overview * Computer Network Defense Services * Computer Network Defense Sustainment Functions * ENCLOSURE B * CYBER INCIDENT HANDLING METHODOLOGY * Introduction * Cyber Incident Handling Process and Life Cycle * Submit Initial Report * Preliminary Response Actions * Cyber Incident Analysis * Response and Recovery * Post-Incident Analysis * First Responder Guidelines * APPENDIX A TO ENCLOSURE B * CYBER INCIDENT AND REPORTABLE CYBER EVENT CATEGORIZATION * Introduction * Categories * Comparison of DoD and Department of Homeland Security (DHS) * Categories * ENCLOSURE C * CYBER INCIDENT REPORTING * Introduction * Reporting Structures * Operational Reporting Practices * Reporting Vehicles * Reporting Timelines * Reporting Formats * Reporting Considerations * Exercise Reporting * APPENDIX A TO ENCLOSURE C * REPORTING TIMELINES * Introduction * Reporting Timelines * APPENDIX B TO ENCLOSURE C * GENERAL CYBER INCIDENT REPORT FORMAT * General Cyber Incident Report Format * Initial Impact Assessment Matrix * APPENDIX C TO ENCLOSURE C * CYBER INCIDENT REPORTING DIAGRAMS * High-Level Overview of Reporting * Cyber Event Detected by Installation * Cyber Event Detected Within Combatant Command * Cyber Event Detected by External CND Group * Cyber Event Detected by Computer Network Defense Services Provider * ENCLOSURE D * CYBER INCIDENT ANALYSIS * Introduction * Cyber Incident Analysis Framework * Computer Forensics Analysis * System Analysis * Malware Analysis * Network Analysis * Analysis and Correlation of Cyber Event and Cyber Incident Data * Legal Issues * APPENDIX A TO ENCLOSURE D * DELIVERY VECTORS * Introduction * Delivery Vector Categories * APPENDIX B TO ENCLOSURE D * SYSTEM WEAKNESSES * Introduction * Determining Information System Weaknesses * APPENDIX C TO ENCLOSURE D * IMPACT ASSESSMENT MATRIX * Impact Assessment * Levels of Impact * Determining Technical and Operational Impact * Cyber Incident Impact Table * Cyber Incident and Event Potential Impact * ENCLOSURE E * CYBER INCIDENT RESPONSE * Introduction * Types of Responses * Developing and Implementing Courses of Action * Recovering Without Performing Technical Analysis * Containment Eradication Recovery Post-Incident Activity * ENCLOSURE F * COLLABORATION WITH OTHER STRATEGIC COMMUNITIES * Introduction * Operational Cooperation with LE/CI * International Coordination * Intelligence Community * Cyber Unified Coordination Group * APPENDIX A TO ENCLOSURE F * COORDINATION AND DECONFLICTION * Introduction * Types of Operations * APPENDIX B TO ENCLOSURE F * INTELLIGENCE SUPPORT TO CYBER INCIDENT REPORTING * Introduction * Joint Incident Management System (JIMS) * Intelligence Reporting Procedures * Product Dissemination * Writing For Release * USCYBERCOM "Smart Book" * ENCLOSURE G * COMPUTER NETWORK DEFENSE INCIDENT HANDLING TOOLS * Joint Incident Management System (JIMS) * Joint Malware Catalog (JMC) * Cyber Intelligence Analysis Tools * DoD Protected Traffic List * DoD Enterprise Incident Sets * DoD Information Network Deception Projects * Cyber Condition (CYBERCON)

贊助商廣告
 
TAAZE 讀冊生活 - 今日66折
專業調酒瘋玩計劃:跟著調酒師喝調酒、玩調酒、練品味,不用喝掛也能成為懂酒知識青年
作者:Allen鄭亦倫
出版社:境好出版事業有限公司
出版日期:2021-11-11
66折: $ 363 
博客來 - 今日66折
低醣.生酮的終極實踐【暢銷修訂版】:找到最適合自己的健康飲食型態
作者:陳俊旭
出版社:天下生活
出版日期:2024-02-17
66折: $ 330 
城邦讀書花園 - 今日66折
婚禮計畫(泰國耽美天后Mame浪漫網劇《邪惡新郎愛上我》原著小說,首刷限量作者手繪印簽 特典贈品版)
作者:Mame
出版社:春光出版
出版日期:2023-12-07
66折: $ 263 
 
金石堂 - 暢銷排行榜
踏上不歸路的那一晚 (首刷限定版)(上)
作者:鷹
出版社:東立出版社
出版日期:2024-06-26
$ 179 
金石堂 - 暢銷排行榜
哲哲的ETF投資絕學:「下殺買、上漲賣」,左側交易讓我從賠500萬到賺1151萬!
作者:郭哲榮
出版社:大樂文化有限公司
出版日期:2024-06-28
$ 237 
Taaze 讀冊生活 - 暢銷排行榜
史上最有梗的東方魔法書:奇幻深遠的道門咒語
作者:A某
出版社:時報文化出版企業股份有限公司
出版日期:2024-06-18
$ 300 
博客來 - 暢銷排行榜
笑魘(01)
作者:服部未定
出版社:尖端
出版日期:2024-06-07
$ 127 
 
Taaze 讀冊生活 - 新書排行榜
最後的贏家:大熊鎮3(下)
作者:菲特烈.貝克曼
出版社:天培
出版日期:2024-06-27
$ 294 
博客來 - 新書排行榜
史上最有梗的東方魔法書:奇幻深遠的道門咒語(隨書加贈咒語小本本)
作者:A某
出版社:時報出版
出版日期:2024-06-18
$ 300 
金石堂 - 新書排行榜
鄉下大叔成為劍聖~只是區區鄉下劍術師傅,成大器的弟子們卻不肯放過我~ 03
作者:乍藤和樹
出版社:東立出版社
出版日期:2024-08-31
$ 119 
Taaze 讀冊生活 - 新書排行榜
翠林島
作者:麥可.克里斯蒂
出版社:馬可孛羅
出版日期:2024-06-01
$ 357 
 

©2024 FindBook.com.tw -  購物比價  找書網  找車網  服務條款  隱私權政策