Thanks to visit codestin.com
Credit goes to link.springer.com

Skip to main content

Incident Response

  • Chapter
  • First Online:
How to Catch a Phish
  • 673 Accesses

Abstract

In addition to identifying suspicious messages, you need to have a plan to respond appropriately. Several frameworks or models exist to help support and lead the response efforts. The Sans.org organization has created the easiest and most relevant framework, PICERL, which is explained in this chapter. First, let’s discuss some terms that help us better understand this framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+
from £29.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 19.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 24.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Oles, N. (2023). Incident Response. In: How to Catch a Phish. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9361-4_3

Download citation

Publish with us

Policies and ethics