+1 vote
in Security Incident Management and Forensics by
What steps would you take after a cybersecurity incident occurs?

1 Answer

0 votes
by

Following steps constitute the incidence response strategy of organizations nowadays:

  • Identification: In this step, the security incident is identified and reported to the higher authorities. IR team tries to find the source of the security breach.
  • Triage and analysis: Data is collected from various sources and analyzed further to find indicators of compromise.
  • Containment: The affected systems are isolated to prevent further damage.
  • Post-incident activity: This step includes documentation of information to prevent such security incidents in the future.

Related questions

+2 votes
asked Sep 10, 2020 in Cyber Security by Hodge
+2 votes
asked Jan 28, 2020 in Cybersecurity Prologue by AdilsonLima
...