Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMP 3010 - Coggle Diagram
COMP 3010
Short term plans to investigate intrusion
- Data sources for detection and response
- Operational Tradeoffs
-
-
-
Recover Systems, data and connectivity
-
Develop a recovery plan
- Rebuild infected systems
- Replace compromised files
- Remove the constraints imposed during containment
- Reset passwords
- Install patches and tighten network perimeter
- Pen Test new systems.
Long term plans for detecting and responding to intruders
- Techniques (IDS + HoneyPots)
- To what networks
- Likelihood of finding the source of the issue
- how to detect and stop similar attacks
-
-
-
-
-
-