Incident Playbooks
-
Content, Incident PlaybooksThe STRIDE Threat ModelSKU: The STRIDE Threat ModelSTRIDE is a model of threats developed by Praerit Garg and Loren Kohnfelder at Microsoft for identif ...
-
Content, Incident PlaybooksThe DREAD Risk Assessment ModelSKU: The DREAD Risk Assessment ModelDREAD is part of a system for risk-assessing computer security threats previously used at Microsoft ...
-
Content, Incident PlaybooksNIST Special Publication 800-39: Managing Information Security RiskSKU: NIST Special Publication 800-39: Managing Information Security RThe purpose of Special Publication 800-39 is to provide guidance for an integrated, organization-wid ...
-
Content, Incident PlaybooksNIST SP 800-30 R1: Risk AssessmentsSKU: NIST SP 800-30 r1 guide for Conducting Risk AssessmentsComprehensive risk assessment guidelines to identify and manage potential threats.
-
Content, Incident PlaybooksMEHARI 2010: Processing guide for risk analysis and managementSKU: MEHARI 2010: Processing guide for risk analysis and managementThis guide presents MEHARI overall processing for risk analysis and treatment and describes the diff ...
-
Content, StandardsISO27005:2008 Information Security Risk ManagementSKU: ISO27005:2008 Information Security Risk ManagementThis International Standard provides guidelines for information security risk management. This suppo ...
-
Content, StandardsISO 31000:2009 Risk managementSKU: ISO 31000:2009 Risk managementThe purpose of the risk management framework is to assist the organization in integrating risk manag ...
-
Content, Incident PlaybooksInsider Abuse Incident Response PlaybookSKU: Insider Abuse Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksGroup Policy Modification Incident Response PlaybookSKU: Group Policy Modification Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDrive By Compromise Incident Response PlaybookSKU: Drive By Compromise Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCredential Access (Unsecured Credentials) Incident Response PlaybookSKU: Credential Access (Unsecured Credentials) Incident Response PlayThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksSocial Engineering Incident Response PlaybookSKU: Social Engineering Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksScam Incident Response PlaybookSKU: Scam Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksResource Development (Compromise Accounts) Incident Response PlaybookSKU: Resource Development (Compromise Accounts) Incident Response PlaThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksPhishing Incident Response PlaybookSKU: Phishing Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksMoney Mule Scams (CEO Fraud) Incident Response PlaybookSKU: Money Mule Scams (CEO Fraud) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksMalware Incident Response PlaybookSKU: Malware Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDevice Theft/Loss Incident Response PlaybookSKU: Device Theft/Loss Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDenial of Service (DOS) Incident Response PlaybookSKU: Denial of Service (DOS) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksDefense Evasion (Disabling Security Software) Incident Reponse PlaybookSKU: Defense Evasion (Disabling Security Software) Incident Reponse PThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCyber Blackmail Incident Reponse PlaybookSKU: Cyber Blackmail Incident Reponse PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCredential Access (Password Spraying) Incident Response PlaybookSKU: Credential Access (Password Spraying) Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCreate Account (Backdoor User Accounts) Incident Response PlaybookSKU: Create Account (Backdoor User Accounts) Incident Response PlaybThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksCloud Email Compromise Incident Response PlaybookSKU: Cloud Email Compromise Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...
-
Content, Incident PlaybooksRansomware Incident Response PlaybookSKU: Ransomware Incident Response PlaybookThis Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a p ...