Chapter 6. Tracing Network Attacks

‚  < ‚  Free Open Study ‚  > ‚  

The two preceding chapters in this book, Chapter 4,"Forming and Managing a Response Team," and Chapter 5,"Organizing for Incident Response," covered the content that their titles indicate . One of the major themes advanced is that because security- related incidents can cause such havoc and because humans and organizations must deal with incidents, ensuring that there is an appropriate structure and process for keeping people, activities, paperwork, and so on organized and well functioning is imperative. Now that these issues have been covered, let's next turn our attention to a more specialized and technical issue: how to trace attacks. You will explore what tracing network attacks means, how to put this kind of activity in perspective for incident response, what some methods of tracing network attacks are, and how to construct an attack path .

‚  < ‚  Free Open Study ‚  > ‚  


Incident Response. A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
ISBN: 1578702569
EAN: 2147483647
Year: 2002
Pages: 103

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net