Note: Page numbers followed by f indicate figures, and t indicate tables.
attacker’s infiltration and exfiltration vectors 114–115
criminal investigation 119
malware and attacker tools 117
post-Breach activities 119
external Breach detection 64–65
proactive Breach detection 63
security monitoring ...
Get Data Breach Preparation and Response now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.