P.Q
In order to successfully prosecute an intruder:
a.A point of contact should be designated to be responsible for communicating with law enforcement and other external agencies
b.Collection of evidence has to be done following predefined procedures
c.A proper chain of custody of evidence has to be preserved
d.To avoid inadvertently tamping with evidence, a replica of the compromised resource should be analyzed rather than the original.
3
16 comments
Sara M
5
P.Q
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by