Management of Incidents

Please read the following links in the order listed below and write down a checklist of what is important to note as far as management of incidents.

1. The Lockheed Martin Intelligence Driven Defense®. Retrieved from Lockheed Martin, https://www.lockheedmartin.com/en-us/capabilities/cyber/intelligence-driven-defense.html Added: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Gaining_the_Advantage_Cyber_Kill_Chain.pdf 2. Addressing the Cyber Kill Chain: Full Gartner Research Report and LookingGlass Perspectives. Retrieved from LookingGlass, https://www.gartner.com/imagesrv/media-products/pdf/lookingglass/lookingglass-1-34D62N3.pdf 3. Laliberte, M. (2016, September 21).

A twist on the Cyber kill chain: Defending against A JavaScript Malware attack. Retrieved from http://www.darkreading.com/attacks-breaches/a-twist-on-the-cyber-kill-chain-defending-against-a-javascript-malware-attack/a/d-id/1326952 4. Assante, M. J., & Lee, R. M. (2015, October ). The Industrial Control System Cyber Kill Chain. Retrieved from SANS, https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297 5. SANS Monitoring and Measuring the CIS Critical Security Controls Poster. (2018). Retrieved from SANS, https://www.sans.org/security-resources/posters/leadership/20-critical-security-controls-55

#Management #Incidents

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions