• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
STEP 1-PREPERATION
THE ORGANIZATION EDUCATES USERS AND IT STAFF OF THE IMPORTANCE OF UPDATED SECURITY MEASURES AND TRAINS THEM
STEP 2- IDENTIFICATION
THE RESPONSE TEAM IS ACTIVATED TO DECIDE WHETHER A PARTICULAR EVENT IS A SECURITY INCIDENT
STEP 3- CONTAINMENT
THE TEAM DETERMINES HOW FAR THE PROBLEM HAS SPREAD AND CONTAINS THE PROBLEM
STEP 4- ERADICATION
THE TEAM INVESTIGATES TO DISCOVER THE ORIGIN OF THE INCIDENT ENSURING THAT NO VULNERABILITIES REMAIN
STEP 5- RECOVERY
DATA AND SOFTWARE ARE RESTORED FROM CLEAN BACKUP FILES
STEP 6- LESSONS LEARNED
THE TEAM ANALYZES THE INCIDENT AND HOW IT WAS HANDLED, MAKING RECOMMENDATIONS FOR BETTER FUTURE RESPONSES.
STEP 1
Preparation
STEP 2
Identification
STEP 3
Containment
STEP 4
Eradication
STEP 5
Recovery
STEP 6
Lessons Learned