Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Incident Response

Incident Response

List Price: $34.95
Your Price:
Product Info Reviews

<< 1 >>

Rating: 3 stars
Summary: Good management level introduction to incident response
Review: Anyone who has flown on a commercial airliner knows well of the pre- flight safety briefings. From the water floatation safety cushions to the oxygen masks, it's the cabin crew's duty to ensure that every passenger is briefed. Why is this safety briefing so vital? Because when a passenger is gasping for air at 39,000 feet, it is unlikely that they will get a response when they press the flight attendant call button.

In many ways, computer incident response is akin to airplane safety; you need to know
what to expect when the inevitable occurs. If an organization attempts to manage things
ex post facto -- whether it is a depressurization at cruise level or a hack attack - their response will invariably fail. As such, the need for IT-based incident response strategy is
crucial.

Why is incident response a necessity? According to data from the Computer Security
Institute (and backed-up by many other security surveys), more than 70% of businesses
reported security breaches in the year 2000. While 70% may have answered the survey
affirmatively, the reality is that every business on the planet has security breaches. It's
simply a matter of how effectively they handle the incident. System and network hacks
are to be expected; how well they are handled, and how the damage is mitigated is up to
the organizations and their respective incident response teams.

Although I used the airline example, the authors of Incident Response compare it to fire
fighting. Incident response is akin to firefighting in that it involves the coordination of
various disciplines, namely: prevention, planning, detection, analysis, containment,
investigation, eradication, and post-incident analysis.

The difference between a fire and incident response is that whereas a fire can be
extinguished with perhaps one or two of the controls just mentioned, effective incident
response requires that all eight of the controls be effectively carried out. Another
difference between firefighting and incident response is that humanity has thousands of
years of experience in putting out fires. Computer security, however, has only been
around for a few decades. From an incident response perspective, the CERT/CC
(Computer Emergency Response Team Coordination Center) is only 13 years old. The
fact that Smokey the Bear is older than information security and incident response should
be humbling to those in technology.

The problem within many elements of corporate information technology is that they don't
understand the intricacies involved with incident response. With that, Incident Response
provides a non-technical introduction to the rudiments of setting up an incident response
team. Many technology managers don't know the difference between Certs candy and
the CERT organization. For those managers, this book will be a good start toward
teaching them how to deal with the inevitable.

Overall, Incident Response is a thorough introduction to incident response. The authors
go into detail about defining what an incident is and analyzing its various components to
show how a multi-disciplinary approach is required to rectify the situation. Those of us
in technology easily understand the need for incident response; unfortunately, many IT
managers think that incident response can be handled in a much more informal and
unofficial way. Such an erroneous management attitude will only lead to many
undetected security incidents.

Although Forno and Van Wyk give a good overview of incident response, the topic is far
too broad to be thoroughly covered in this monograph alone. For those who need a deeper
and more technical look at incident response and its associated field of computer
forensics, the following books will likely be beneficial:

· Incident Response: A Strategic Guide to Handling System and Network Security
Breaches by Russell Shumway & Gene Schultz, New Riders Publishing 2002;
ISBN: 1578702569 2002
· Incident Response: Investigating Computer Crime by Chris Prosise & Kevin
Mandia, McGraw-Hill Professional Publishing 2001; ISBN: 0072131829
· Computer Forensics -- Incident Response Essentials by Warren Kruse & Jay
Heiser, Addison-Wesley 2001, ISBN: 0201707195.

Rating: 3 stars
Summary: Good for organizing IR team
Review: At only 200 or so pages, the Incident Response is too brief to qualify as the Bible of Incident Response, but it certainly comes close. This excellent manual by two renowned security experts describes the administrative measures needed to create, train, maintain and operate an information incident response team. It also sheds light on sniffers, intrusion detection systems, vulnerability scanners, computer forensics utilities and other "tools of the trade" for the emergency response professional.

Co-author Kenneth R. van Wyk helped found CERT/CC, chaired the FIRST organization and helped launch the first commercial incident response team in the US. His collaborator, Richard Forno, established the first computer incident response team for the US House of Representatives, served as Chief Security Officer for the domain registry Network Solutions and has written a book on information warfare.

Together, they have produced a book that will be most useful to large companies -- since smaller ones just cannot afford a dedicated internal emergency team. However, they also discuss the considerations of choosing an outside team (public or commercial), which will definitely help smaller companies, as will the simple steps for handling incidents before the response team flies in. The team lifetime is outlined in a clear and concise manner: planning, reporting, staffing, training, developing procedures and testing them in real life. Additionally, van Wyk and Forno explain the logical steps to take in case of a penetration and they have optimized these steps for deployment under pressure.

Overall, Incident Response is a great book to own if you are an information security professional or an IT professional wearing the "security hat." It is also extremely useful if you are a manager tasked with creating a response team, because it can serve as a summary of special knowledge developed in the area.

Rating: 3 stars
Summary: Good for organizing IR team
Review: At only 200 or so pages, the Incident Response is too brief to qualify as the Bible of Incident Response, but it certainly comes close. This excellent manual by two renowned security experts describes the administrative measures needed to create, train, maintain and operate an information incident response team. It also sheds light on sniffers, intrusion detection systems, vulnerability scanners, computer forensics utilities and other "tools of the trade" for the emergency response professional.

Co-author Kenneth R. van Wyk helped found CERT/CC, chaired the FIRST organization and helped launch the first commercial incident response team in the US. His collaborator, Richard Forno, established the first computer incident response team for the US House of Representatives, served as Chief Security Officer for the domain registry Network Solutions and has written a book on information warfare.

Together, they have produced a book that will be most useful to large companies -- since smaller ones just cannot afford a dedicated internal emergency team. However, they also discuss the considerations of choosing an outside team (public or commercial), which will definitely help smaller companies, as will the simple steps for handling incidents before the response team flies in. The team lifetime is outlined in a clear and concise manner: planning, reporting, staffing, training, developing procedures and testing them in real life. Additionally, van Wyk and Forno explain the logical steps to take in case of a penetration and they have optimized these steps for deployment under pressure.

Overall, Incident Response is a great book to own if you are an information security professional or an IT professional wearing the "security hat." It is also extremely useful if you are a manager tasked with creating a response team, because it can serve as a summary of special knowledge developed in the area.

Rating: 4 stars
Summary: Nice intro to incident response
Review: I found this a good intro to incident response, particularly since I have to develop a comprehensive program for our company and tie that with our subsidaries around the world. (I am the head of Global Incident Response for a Fortune 500 company) For managers and CIO folks, this book is a very handy reference that doesn't scare folks away.....if you want gads of screen shots and techno-babble, look elsewhere. If you want a book that managers and those with little time can read, learn from, and apply, get this one. This is the Cliff Notes of Incident Response - nothing more, and nothing less.

Rating: 1 stars
Summary: Cliff Notes for Incident Response
Review: I think Mr. Cananady hit the nail on the head! The problem with this book is that O'Reilly readership has come to expect more from their publications - like substance and detail! Managers and CIOs should read Denning's "Information Warfare and Security" or Schneier's "Secrets and Lies" for the low down on security.

Rating: 1 stars
Summary: Need Lower Rating Scale for this one.
Review: Not sure what O'Reilly had in mind in publishing this book. You can get pretty much the same information from organizations like CERT for FREE. If meant for management, it still missed the mark since in many cases management is still trying to learn how to spell S-E-C-U-R-I-T-Y. A concept like IR is way over their heads and out of the question. With shrinking budgets people are looking for solutions not another obtuse layer of complexity. Glad to see the price drop - still too much for what you get.

Rating: 4 stars
Summary: Very helpful - management oriented, not techno-geeky
Review: The book is a great introduction to incident handling, and is appropriate for both systems folks as well as their managers. This is not the heaviest security book in the world and that's because it doesn't get bogged down in the nitty-gritty technology stuff of computer security. (If you want a hand-holding how-to-do-it book, there are others better suited.)

Rare for a technology book, they take a management approach instead of a purely technical one, and thus probably means they have a wider target audience that will benefit from it. Also, the book isn't Unix- or Windows- based, what they talk about is handy for any computing platform for any size company.

However it does do a great job of introducing you to incident response - why it's needed and what options you have for it. They are correct that it is a process not a solution.

The tools section is a good overview and introduction - by no means complete - and the authors even say that it's not all-incompassing. I guess we all know how fast software changes, and that it's impossible to cover everything.

Rating: 1 stars
Summary: Disappointed
Review: This book really lacks substance, first of all it must be meant for someone with no understanding of the internet or technology in general (like senior management or a new student). There are very high level examples of processes and procedures as well as high level examples of tools of the trade. At least Dragon IDS was mentioned (probably the best IDS however not the most popular), even though the screen shots are out of date and the old reference to Cabletron not Entrasys. Technologists will have no use for this book except to give it to their manager who refuses to use email or computers however still needs to understand what his organization needs to prepare for on Incident Response.


<< 1 >>

© 2004, ReviewFocus or its affiliates