- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 68字
- 2021-06-30 19:15:50
Post-incident activity
The incident priority may dictate the containment strategy—for example, if you are dealing with a DDoS attack that was opened as a high-priority incident, the containment strategy must be treated with the same level of criticality. It is rare that the situations where the incident is opened as high severity are prescribed medium-priority containment measures, unless the issue was somehow resolved in between phases.
推薦閱讀
- Cybersecurity:Attack and Defense Strategies
- 從零開始寫Linux內核:一書學透核心原理與實現
- FreeRTOS實時內核應用指南
- Mobile First Design with HTML5 and CSS3
- VMware NSX Cookbook
- AWS Development Essentials
- 無蘋果不生活 The New iPad隨身寶典
- CentOS 6 Linux Server Cookbook
- 從零開始學安裝與重裝系統
- Linux操作系統
- iOS 10 開發指南
- Docker容器技術與應用
- Android應用性能優化最佳實踐
- Linux指令從初學到精通
- Python機器學習系統構建(原書第3版)