CHAPTER 3Tools and Techniques for Detecting Cyber Incidents

Olivia settled into her office early that day at 8:00 a.m., hoping to catch up on the news before starting the daily system maintenance tasks she undertook as a junior systems administrator at her non-profit, non-governmental organization (NGO). She checked out Google News, the New York Times, and then moved on to the Mapleton Daily Gazette’s home page, which she considered the best local news source. The paper’s reporters were particularly excellent in covering the city’s local government.

She clicked on the Gazette’s bookmark below her browser bar, and nothing appeared on the screen. Must have made a mistake, she thought, so she clicked on it again. Nothing. Then she manually typed the URL into the browser bar. Still nothing. She tried again. This time the paper’s home page appeared. Metropolitan Broadband, the NGO’s broadband provider, must be working on the network again and causing intermittent outages, Olivia thought. She scanned the newspaper’s home page, and nothing interested her, so she turned to her e-mail.

She bolted upright when she saw thirty alerts from her anomaly detection system, with more pouring in every ...

Get Cybersecurity Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.