‚ < ‚ Free Open Study ‚ > ‚ |
We have now established that incident response is extremely important in today's cybercomputing world and that security- related incidents pose high levels of threat to organizations. With this background in mind, we will now move on to the process of responding to incidents. Specifically, this chapter describes a methodology and framework for responding to incidents. It also presents important considerations surrounding the use of this methodology. We will start by considering why it is important to use an incident response methodology in the first place. |
‚ < ‚ Free Open Study ‚ > ‚ |