10
Impact
At this point, we’ve reached the last stage of the attack: impact. This is where threat actors achieve their goals and get what they want. Financial theft, data encryption, manipulation or destruction, resource hijacking, DoS – these are all direct consequences of incidents. Part of responding to such incidents is assessing the damage that’s been caused. This usually includes various qualitative and quantitative indicators related to the value of the data or systems, the scope of the attack, and the resources required for recovery. However, some consequences are not so easy to assess. These include, for example, reputational damage, financial loss, and legal implications.
To effectively respond to incidents, it is necessary to not ...
Get Incident Response for Windows now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.