November 2010
Intermediate to advanced
384 pages
10h 21m
English
DESPITE THE BEST EFFORTS to secure a computing environment, no organization is completely safe. Sooner or later you will encounter a security policy violation. It may be a minor violation such as a user attempting to log on too many times after forgetting a password. Or, it could be a major incident such as an attacker destroying your organization's primary database. Either way, learn how to react. When you discover a security violation, you have only one proper response—to follow your plan.
Map out your response to security violations before any occur. In this chapter, you'll find out how to plan for the inevitable actions that result in security violations. You'll learn how to recognize ...