Please enable JavaScript.
Coggle requires JavaScript to display documents.
3.4 - Coggle Diagram
3.4
what details should be recorded when an accident has been detected?
when has the incident detected?
what type of attack has been used?
has a virus or malware been injected?
can the attack/hack be back traced?
which category does the attack fit in?
which part of the system has been breached?
can the damage or data be recovered?
what are three steps of incident management?
plan out a contingency plan
figure out what part of the system has been attacked and what data has been damaged or lost
investigate
what are three basic categories of incidents?
repetitive
complex
major
identify one type of incident
data breach
what is the initial step in any incident management process?
figuring out which part of the system is being or has been attacked