Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
12 Cards in this Set
- Front
- Back
STEP 1-PREPERATION
|
THE ORGANIZATION EDUCATES USERS AND IT STAFF OF THE IMPORTANCE OF UPDATED SECURITY MEASURES AND TRAINS THEM
|
|
STEP 2- IDENTIFICATION
|
THE RESPONSE TEAM IS ACTIVATED TO DECIDE WHETHER A PARTICULAR EVENT IS A SECURITY INCIDENT
|
|
STEP 3- CONTAINMENT
|
THE TEAM DETERMINES HOW FAR THE PROBLEM HAS SPREAD AND CONTAINS THE PROBLEM
|
|
STEP 4- ERADICATION
|
THE TEAM INVESTIGATES TO DISCOVER THE ORIGIN OF THE INCIDENT ENSURING THAT NO VULNERABILITIES REMAIN
|
|
STEP 5- RECOVERY
|
DATA AND SOFTWARE ARE RESTORED FROM CLEAN BACKUP FILES
|
|
STEP 6- LESSONS LEARNED
|
THE TEAM ANALYZES THE INCIDENT AND HOW IT WAS HANDLED, MAKING RECOMMENDATIONS FOR BETTER FUTURE RESPONSES.
|
|
STEP 1
|
Preparation
|
|
STEP 2
|
Identification
|
|
STEP 3
|
Containment
|
|
STEP 4
|
Eradication
|
|
STEP 5
|
Recovery
|
|
STEP 6
|
Lessons Learned
|