TY - GEN N2 - This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery. DO - 10.1007/978-3-030-69174-5 DO - doi AB - This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry. Shares cases studies on using ML and AI to predict and preempt cyber attacks; Describes security attacks, trends, and scenarios along with attack vectors for various domains and industry sectors; Includes detail on incident planning, detection methods, containing incidents, and clean up and recovery. T1 - Security incidents & response against cyber attacks / DA - 2021. CY - Cham : AU - Bhardwaj, Akashdeep, AU - Sapra, Varun, CN - QA76.9.A25 PB - Springer, PP - Cham : PY - 2021. N1 - Includes index. ID - 1438042 KW - Computer security KW - Sécurité informatique SN - 9783030691745 SN - 3030691748 TI - Security incidents & response against cyber attacks / LK - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-69174-5 UR - https://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-69174-5 ER -