Incident Response Plan | Roadmap to Securing Your Infrastructure
Linux Academy
MAY 13, 2019
We can always just restore from a backup and be up and running in a few hours. When isolating infected workstations, they should be left powered on with the network cables removed and all network adapters disabled within the operating system. Each step is documented in the incident response form as the exercise is played out.
Let's personalize your content