List the seven steps of the incident recovery process, according to Donald Pipkin.

What will be an ideal response?


The incident recovery process involves the following steps:- Identify the vulnerabilities that allowed the incident to occur and spread. Resolve them.- Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace, or upgrade them.- Evaluate monitoring capabilities (if present). Improve detection and reporting methods, or install new monitoring capabilities.- Restore the data from backups.- Restore the services and processes in use.- Continuously monitor the system.- Restore the confidence of the organization's communities of interest.

Computer Science & Information Technology

You might also like to view...

Which of the following statements doubles the value stored in answer?

A) answer += 2; B) answer *= 2; C) answer = answer * 2; D) All three of the above E) Both B and C, but not A

Computer Science & Information Technology

If the base class member has a protected access and the derived class access specifier is public, the derived class member is ____ to its class.

A. private B. blocked C. public D. protected

Computer Science & Information Technology

Because the goals and objectives of CIOs and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a ____________________ manager."

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The older 64-bit operating systems can only handle 4 GB of RAM.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology