Index
As this ebook edition doesn't have fixed pagination, the page numbers below are hyperlinked for reference only, based on the printed edition of this book.
A
Active Directory (AD) logs 127
Advanced Encryption Standard (AES) 108
Advanced Persistent Threats (APTs) 4, 131
AI-based detection 15
AI SOC analyst 70
anomaly detection 15
artificial intelligence (AI) 7
attack surface 102
automated response 4
B
brittle detection 9
C
ChatGPT 70
Clearance of personal items 115
cloud-based EDR 29
advantages 29
disadvantages 29
Command-and-Control (C2) communications 121
configuration modification technique 92
CrowdStrike Falcon Insight 26
cybersecurity
threats and challenges 5, 6
D
defense in depth (DiD) 7
detection and response (DR) tools 13
DFIR life cycle 62
containment, eradication, and recovery 63
detection and analysis 62
past incident activity 63
preparation 62
...