How to Respond to an Attack

Response to an attack is typically initiated by a user, employee, contractor, or third-party user calling the IT help desk, network operations center, or security operations center. After an attacker exploits a vulnerability in an IT infrastructure or its assets, a security incident is created. This security incident may manifest itself into an immediate confidentiality, integrity, or availability issue that must be called in to the IT help desk. Upon receipt of the security incident call, the IT help desk must initially assess the criticality factor of the security incident. The criticality factor for the security incident will dictate the level of response that is needed to respond to this attack or security incident. ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.