官术网_书友最值得收藏!

Incident life cycle

Every incident that starts must have an end, and what happens in between the beginning and the end are different phases that will determine the outcome of the response process. This is an ongoing process that we call the incident life cycle. What we have described until now can be considered the preparation phase. However, this phase is broader than that—it also has the partial implementation of security controls that were created based on the initial risk assessment (this was supposedly done even before creating the incident response process).

Also included in the preparation phase is the implementation of other security controls, such as:

  • Endpoint protection
  • Malware protection
  • Network security

The preparation phase is not static, and you can see in the following diagram that this phase will receive input from post-incident activity.

The other phases of the life cycle and how they interact are also shown in this diagram:

The DETECTION and CONTAINMENT phase could have multiple interactions within the same incident. Once the loop is over, you will move on to the post-incident activity phase. The sections that follow will cover these last three phases in more detail.

主站蜘蛛池模板: 黄龙县| 芮城县| 阿合奇县| 湖南省| 茶陵县| 五台县| 西丰县| 嘉黎县| 搜索| 化德县| 温泉县| 仁怀市| 封丘县| 龙海市| 四子王旗| 嘉禾县| 新野县| 神农架林区| 日照市| 海宁市| 出国| 吴旗县| 翁牛特旗| 涿州市| 禹州市| 登封市| 达孜县| 西峡县| 文水县| 前郭尔| 金山区| 都江堰市| 新和县| 徐州市| 鄢陵县| 彭阳县| 拜泉县| 辉县市| 双流县| 郁南县| 阳谷县|