October 2019
Intermediate to advanced
374 pages
13h 10m
English
A recurring three-step process is followed for addressing attacks. This process is referred to as the discovery-analysis-remediation cycle (FIGURE 1-3). This process may occur exclusively within your organization, outside your organization to include cloud-based service providers, or both.
FIGURE 1-3Discovery-analysis-remediation.
© Jones & Bartlett Learning.
The first step in responding to an attack is to know an attack has occurred or is occurring. Discovering an attack is often more difficult than it would seem. Experienced attackers know that the success of an exploit often depends on ...
Read now
Unlock full access