List and describe the four phases of incident response.

What will be an ideal response?


1. Planning-getting ready to handle incidents
2. Detection-identifying that an incident has occurred
3. Reaction-responding to the immediate threat of an incident and regaining control of information assets
4. Recovery-getting things "back to normal," resolving the damage done during the incident, and understanding what happened to prevent reoccurrence

Computer Science & Information Technology

You might also like to view...

The keyword sealed is applied to methods and classes to:

a) prevent overriding and inheritance b) guarantee an implementation exists c) specify a class is concrete d) None of the above.

Computer Science & Information Technology

Which of the following is not an algorithm?

a. A recipe. b. Operating instructions. c. Textbook index. d. Shampoo instructions (lather, rinse, repeat).

Computer Science & Information Technology

The file system and the IOCS support application programs in real time as they execute and thus must be __________.

a. transient b. open source c. linkable d. resident

Computer Science & Information Technology

A plastic scribe is a technology tool to write on smartphones and tablets

Indicate whether the statement is true or false

Computer Science & Information Technology