‚ < ‚ Free Open Study ‚ > ‚ |
The two preceding chapters in this book, Chapter 4,"Forming and Managing a Response Team," and Chapter 5,"Organizing for Incident Response," covered the content that their titles indicate . One of the major themes advanced is that because security- related incidents can cause such havoc and because humans and organizations must deal with incidents, ensuring that there is an appropriate structure and process for keeping people, activities, paperwork, and so on organized and well functioning is imperative. Now that these issues have been covered, let's next turn our attention to a more specialized and technical issue: how to trace attacks. You will explore what tracing network attacks means, how to put this kind of activity in perspective for incident response, what some methods of tracing network attacks are, and how to construct an attack path . |
‚ < ‚ Free Open Study ‚ > ‚ |