Incident Response for Windows Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems
Description
More Details
Notes
Table of Contents
Reviews from GoodReads
Citations
Tykushin, A., Ostrovskaya, S., & Volkov, D. (2024). Incident Response for Windows: Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems (1st edition.). Packt Publishing, Limited.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Tykushin, Anatoly, Svetlana, Ostrovskaya and Dmitry, Volkov. 2024. Incident Response for Windows: Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems. Birmingham: Packt Publishing, Limited.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Tykushin, Anatoly, Svetlana, Ostrovskaya and Dmitry, Volkov. Incident Response for Windows: Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems Birmingham: Packt Publishing, Limited, 2024.
Harvard Citation (style guide)Tykushin, A., Ostrovskaya, S. and Volkov, D. (2024). Incident response for windows: adapt effective strategies for managing sophisticated cyberattacks targeting windows systems. 1st edn. Birmingham: Packt Publishing, Limited.
MLA Citation, 9th Edition (style guide)Tykushin, Anatoly,, Svetlana Ostrovskaya, and Dmitry Volkov. Incident Response for Windows: Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems 1st edition., Packt Publishing, Limited, 2024.
Staff View
Grouping Information
Grouped Work ID | f3115323-95fb-01dc-bc39-68431862cfed-eng |
---|---|
Full title | incident response for windows adapt effective strategies for managing sophisticated cyberattacks targeting windows systems |
Author | tykushin anatoly |
Grouping Category | book |
Last Update | 2025-01-24 12:33:29PM |
Last Indexed | 2025-05-22 03:45:29AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Feb 28, 2025 |
Last Used | Feb 28, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:30:26 PM |
---|---|
Last File Modification Time | Dec 17, 2024 08:39:27 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 07968cam a22005417a 4500 | ||
---|---|---|---|
001 | on1450839622 | ||
003 | OCoLC | ||
005 | 20241217082832.0 | ||
006 | m o d | ||
007 | cr cnu|||||||| | ||
008 | 240817s2024 enk o 000 0 eng d | ||
019 | |a 1450556309|a 1463682924 | ||
020 | |a 9781804618011 | ||
020 | |a 1804618012 | ||
035 | |a (OCoLC)1450839622|z (OCoLC)1450556309|z (OCoLC)1463682924 | ||
037 | |a 9781804619322|b O'Reilly Media | ||
040 | |a EBLCP|b eng|c EBLCP|d YDX|d ORMDA|d OCLCO|d TEFOD | ||
049 | |a MAIN | ||
050 | 4 | |a HV8079.C65 | |
082 | 0 | 4 | |a 363.25/968|2 23/eng/20240903 |
100 | 1 | |a Tykushin, Anatoly,|e author. | |
245 | 1 | 0 | |a Incident Response for Windows|h [electronic resource] :|b Adapt Effective Strategies for Managing Sophisticated Cyberattacks Targeting Windows Systems /|c Anatoly Tykushin, Svetlana Ostrovskaya ; foreword by Dmitry Volkov. |
250 | |a 1st edition. | ||
260 | |a Birmingham :|b Packt Publishing, Limited,|c 2024. | ||
300 | |a 1 online resource (244 p.) | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
500 | |a Lateral tool transfer | ||
505 | 0 | |a Cover -- Title Page -- Copyright and credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Understanding the Threat Landscape and Attack Life Cycle -- Chapter 1: Introduction to the Threat Landscape -- Getting familiar with the cyber threat landscape -- Types of threat actors and their motivations -- APTs -- Cybercriminals -- Hacktivists -- Competitors -- Insider threats -- Terrorist groups -- Script kiddies -- Wrapping up -- Building the cyber threat landscape -- Summary -- Chapter 2: Understanding the Attack Life Cycle -- Phase 1 -- gaining an initial foothold | |
505 | 8 | |a Gaining access to the network -- Establishing a foothold -- Network discovery -- Phase 2 -- Key assets discovery -- Case study -- Network propagation -- Case study -- Phase 3 -- Data exfiltration -- Impact -- Case study -- Part 2: Incident Response Procedures and Endpoint Forensic Evidence Collection -- Chapter 3: Phases of an Efficient Incident Response on Windows Infrastructure -- Incident response roles, resources, and problem statements -- Preparation and planning -- developing an effective incident response plan | |
505 | 8 | |a Detection and verification -- identifying, assessing, and confirming cybersecurity incidents targeting Windows systems -- Incident detection -- Incident verification -- Incident classification -- Incident analysis and containment -- investigating and stopping the spread of cyberattacks -- Incident analysis -- Incident containment -- Eradication and recovery -- removing the intrusion signs and getting back to normal -- Eradication -- Recovery -- Summary -- Chapter 4: Endpoint Forensic Evidence Collection -- Introduction to endpoint evidence collection -- Collecting data from the endpoints | |
505 | 8 | |a Non-volatile data collection -- Memory collection -- Network traffic collection -- Scaling forensic evidence collection -- Summary -- Part 3: Incident Analysis and Threat Hunting on Windows Systems -- Chapter 5: Gaining Access to the Network -- Exploiting public-facing applications -- External remote services -- Spear phishing attacks -- Drive-by compromise -- Other initial access techniques -- Summary -- Chapter 6: Establishing a Foothold -- Methods of post-exploitation -- Maintaining persistent access on Windows systems -- Event logs -- Windows registry -- Filesystem metafiles -- Other sources | |
505 | 8 | |a Understanding C2 communication channels -- Summary -- Chapter 7: Network and Key Assets Discovery -- Techniques to discover the Windows environment -- Case 1 -- ransomware operators -- Case 2 -- classic, financially motivated groups -- Case 3 -- corporate espionage -- Detecting discovery -- Using specialized programs -- Using system utilities -- Accessing specific locations and files -- Interim data exfiltration -- Summary -- Chapter 8: Network Propagation -- Lateral movement in the Windows environment -- Detecting lateral movement -- Remote services -- Software deployment tools | |
520 | |a Get to grips with modern sophisticated attacks, their intrusion life cycles, and the key motivations of adversaries, and build the most effective cybersecurity incident preparedness, response, remediation, and prevention methodologies Key Features Explore contemporary sophisticated cyber threats, focusing on their tactics, techniques, and procedures Craft the most robust enterprise-wide cybersecurity incident response methodology, scalable to any magnitude Master the development of efficient incident remediation and prevention strategies Purchase of the print or Kindle book includes a free PDF eBook Book Description Cybersecurity incidents are becoming increasingly common and costly, making incident response a critical domain for organizations to understand and implement. This book enables you to effectively detect, respond to, and prevent cyberattacks on Windows-based systems by equipping you with the knowledge and tools needed to safeguard your organization's critical assets, in line with the current threat landscape. The book begins by introducing you to modern sophisticated cyberattacks, including threat actors, methods, and motivations. Then, the phases of efficient incident response are linked to the attack's life cycle using a unified cyber kill chain. As you advance, you'll explore various types of Windows-based platform endpoint forensic evidence and the arsenal necessary to gain full visibility of the Windows infrastructure. The concluding chapters discuss the best practices in the threat hunting process, along with proactive approaches that you can take to discover cybersecurity incidents before they reach their final stage. By the end of this book, you'll have gained the skills necessary to run intelligence-driven incident response in a Windows environment, establishing a full-fledged incident response and management process, as well as proactive methodologies to enhance the cybersecurity posture of an enterprise environment. What you will learn Explore diverse approaches and investigative procedures applicable to any Windows system Grasp various techniques to analyze Windows-based endpoints Discover how to conduct infrastructure-wide analyses to identify the scope of cybersecurity incidents Develop effective strategies for incident remediation and prevention Attain comprehensive infrastructure visibility and establish a threat hunting process Execute incident reporting procedures effectively Who this book is for This book is for IT professionals, Windows IT administrators, cybersecurity practitioners, and incident response teams, including SOC teams, responsible for managing cybersecurity incidents in Windows-based environments. Specifically, system administrators, security analysts, and network engineers tasked with maintaining the security of Windows systems and networks will find this book indispensable. Basic understanding of Windows systems and cybersecurity concepts is needed to grasp the concepts in this book. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer crimes|x Investigation.|9 34187 | |
650 | 0 | |a Computer security.|9 65527 | |
650 | 0 | |a Windows (Computer programs)|9 64134 | |
700 | 1 | |a Ostrovskaya, Svetlana,|e author. | |
700 | 1 | |a Volkov, Dmitry,|e writer of foreword. | |
776 | 0 | 8 | |i Print version:|a Tykushin, Anatoly|t Incident Response for Windows|d Birmingham : Packt Publishing, Limited,c2024 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781804619322/?ar|x O'Reilly|z eBook |
938 | |a ProQuest Ebook Central|b EBLB|n EBL31571568 | ||
938 | |a YBP Library Services|b YANK|n 306568687 | ||
994 | |a 92|b VIA | ||
999 | |c 361194|d 361194 |