Part III: Incident Victims
The victim of the attack is not just the system or individual being stalked; there are some additional or peripheral victims who also are affected by incidents of cybercrime. In incident response, it is important not only to discover the threat and the technical means of penetration, but to understand what the reactions will be to this incident—from other employees, the executives, the stockholders, the competitors, the public, advertisers, new recruits, current clients, and potential customers. Like the fallout of a conventional crime that affects more than just the victim, an information security breach does not end when all the systems are rebooted, scanned, fixed, and secured. Understanding and assessing all of ...
Get Incident Response: A Strategic Guide to Handling System and Network Security Breaches now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.