Index

Note: Page numbers followed by f indicate figures, and t indicate tables.

A

Alexiou principle 102–103
AtHoc 191

B

Breach Breakdown 97
Breach containment 
attacker’s infiltration and exfiltration vectors 114–115
countermeasures 115
criminal investigation 119
data Breach 116
law enforcement 120
malware and attacker tools 117
myopic approach 115
patching systems 121–122
post-Breach activities 119
rebuilding systems 122–123
Red Team services 116–117
removing system 121
security Breach 110–111
system shutdown 120–121
vulnerabilities 111, 113
window of compromise 110, 110f, 112
window of intrusion 110, 110f, 112–113
Breach detection 
external Breach detection 64–65
self-detection 
employees 61
proactive Breach detection 63
security monitoring  ...

Get Data Breach Preparation and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.