Skip to main content

Necessary Prerequisites

  • Chapter
  • First Online:
Cybersecurity Incident Response
  • 1930 Accesses

Abstract

Prior to building the incident response program, specific capabilities must exist. At a minimum, these should include adoption of a chosen framework; an understanding of the assets the entity must focus on protecting; documentation of the risks to the confidentiality, integrity, and availability of the assets; and assurance that all fundamental protective capabilities exist. Examples of these capabilities include

  • Access-control processes and restriction of elevated privileges

  • Protection from misuse of data in motion, in use, and at rest

  • Hardening of hardware, based on established standards

  • Understanding and management of vulnerabilities

  • Existence of communication and control network protections (firewalls, etc.)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Eric C. Thompson

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thompson, E.C. (2018). Necessary Prerequisites. In: Cybersecurity Incident Response. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3870-7_2

Download citation

Publish with us

Policies and ethics