The Importance of Risk Analysis in Incident Response

Why has the majority of this chapter been devoted to risk analysis when this book is supposed to cover incident response? Let’s put together everything that has been covered so far. Chapter 1 already introduced the major types of incidents. These included breaches of confidentiality, compromised integrity, disrupted availability, repudiation, harassment attempts, extortion attempts, pornography trafficking, computer misuse that involves organized crime, subversion, and hoaxes.We also have presented data showing that cyberattacks and system misuse are causing substantial financial loss for companies and organizations. Now, most recently, we have gone over major categories of risk and their ...

Get Incident Response: A Strategic Guide to Handling System and Network Security Breaches now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.