Text
Digital forensics and incident response: a practical guide to deploying digital forensic techniques in response to cyber security incidents
Contents:
Chapter 1 Incident response
The incident response process
The incident response framework
The incident response plan
The incident response playbook
Summary
Chapter 2 Forensic fundamentals
Legal aspects
Digital forensic fundamentals
Summary
Chapter 3 Network evidence collection
Preparation
Network device evidence
Packet capture
Evidence collection
Summary
Chapter 4 Acquiring host-based evidence
Preparation
Evidence volatility
Evidence acquisition
Evidence collection procedures
Non-volatile data
Summary
Chapter 5 Undestanding forensic imaging
Overview of forensic imaging
Preparing a stage drive
Imaging
Summary
Chapter 6 Network evidence analysis
Analyzing packet captures
Analyzing network log files
Summary
Chapter 7 Analysis system memory
Memory evidence overview
Memory analysis
Summary
Chapter 8 Analyzing system storage
Forensic platforms
Summary
Chapter 9 Forensic reporting
Documentation overview
Incident tracking
Written reports
Summary
Chapter 10 Malware analysis
Malware overview
Malware analysis overview
Analyzing Malware
Dynamic analysis
Summary
Chapter 11 Threat intelligence
Threat intelligence overview
Threat intelligence methodology
Threat intelligence direction
Threat intelligence sources
Threat intelligence platforms
Using threat intelligence
Summary
Index
No other version available