Dallas Baker

Dallas Baker

Self-taught and motivated software engineer with a passion for security. I love solving problems and I believe computer science can solve all of our problems and is the answer to all our questions.

Lessons Learned in Incident Handling

What happened and how can we improve our capabilities. Immediately after the system is back online in production start developing a follow-up report.

Recovery in Incident Handling

Back to business, as usual, is the goal in the recovery phase of incident handling. Putting systems back into production in a safe manner is important.

Eradication in Incident Handling

With the bleeding stopped, the goal of the eradication phase is to rid the system of any and all artifacts created by the attacker.

Containment in Incident Handling

isolate the threat to stop the attack from spreading to other systems or causing more damage.

Identification in Incident Handling

Identification phase of incident handling involves detecting threats, vulnerabilities​, and security incidents.

Preparation in Incident Handling.

Security professionals will spend most of their time in the preparation and identification phases of the incident handling process. I'll be covering People, policy, data, software, communications, supplies, environment, and documentation of the preparation phase.

Incident Handling​

Incident handling is a plan of action for dealing with intrusions, cyber-theft, denial of service or any other information security-related events.

The Staircase problem

The following problem is from hacker rank... Consider a staircase

Data Structures​

Linked List A Linked list is a group of nodes

Hashing

What hashing is and how it works.