A cybersecurity analyst detected that an attacker compromised a network and downloaded an executable. Through analysis, the analyst discovered the executable deleted all linux server files and backups using the rm -rf command. Which of the following are the NEXT phases for handling this incident? (Select TWO).
A Containment, eradication, and recovery
B Detection and analysis
C Eradication
D Containment, recovery, and eradication
E Post-incident
Post-analysis
B and D will be the correct one.
##That is all about your answer........please upvote my answer...........please..........
A cybersecurity analyst detected that an attacker compromised a network and downloaded an executable. Through analysis,...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...