List the seven steps of the incident recovery process, according to Donald Pipkin.
What will be an ideal response?
The incident recovery process involves the following steps:- Identify the vulnerabilities that allowed the incident to occur and spread. Resolve them.- Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace, or upgrade them.- Evaluate monitoring capabilities (if present). Improve detection and reporting methods, or install new monitoring capabilities.- Restore the data from backups.- Restore the services and processes in use.- Continuously monitor the system.- Restore the confidence of the organization's communities of interest.
You might also like to view...
Which of the following statements doubles the value stored in answer?
A) answer += 2; B) answer *= 2; C) answer = answer * 2; D) All three of the above E) Both B and C, but not A
If the base class member has a protected access and the derived class access specifier is public, the derived class member is ____ to its class.
A. private B. blocked C. public D. protected
Because the goals and objectives of CIOs and CISOs tend to contradict each other, InformationWeek recommends: "The people who do and the people who watch shouldn't report to a ____________________ manager."
Fill in the blank(s) with the appropriate word(s).
The older 64-bit operating systems can only handle 4 GB of RAM.
Answer the following statement true (T) or false (F)