O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Handling Specific Incidents

The principles outlined in the previous section provide an excellent framework for handling all computer-security incidents. In this section, we examine specific steps that should be taken in response to certain types of incidents.

Web Server Attacks

Web server attacks usually take one of two forms: denial-of-service attacks or site defacement. Denial-of-service attacks aim to prevent Web users from accessing a site. Response teams can often blunt these attacks by having rapid response “hot sites” and DNS modification kits available to redirect Web traffic. When hackers launch site-defacement attacks, they replace legitimate Web content with content of their own choosing (often denigrating the target organization or ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required