List the seven steps of the incident recovery process, according to Donald Pipkin.
What will be an ideal response?
The incident recovery process involves the following steps:- Identify the vulnerabilities that allowed the incident to occur and spread. Resolve them.- Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace, or upgrade them.- Evaluate monitoring capabilities (if present). Improve detection and reporting methods, or install new monitoring capabilities.- Restore the data from backups.- Restore the services and processes in use.- Continuously monitor the system.- Restore the confidence of the organization's communities of interest.
You might also like to view...
The Secure Sockets Layer (SSL) protocol provided updates for the Transport Layer Security (TLS) protocol
Indicate whether the statement is true or false
The command ls ?? matches the filename(s)
a: AB and ab b: abc c: ?? d: AAAA e: CCAA