Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO4 Understand how to manage cyber security incidents (4.1 Responding to…
LO4 Understand how to manage cyber security incidents
4.1 Responding to an incident
Who to contact
Procedures
Responsibilities: Who is involved?
Extent of the incident (impact): hardware/software/data/network
Contain the incident
Eradicate the incident
Reduce the impact and recover
4.2 Cyber security incident report
Incident title and date
Target of the incident
Incident category
Critical: Lives may be lost
Significant: Major impact
Minor: Inconvenience
Negligible: Minimal impact
What type of attacker
Internal
External
Group
Description of the incident
Purpose of the incident
Techniques used by attacker