CXO

Develop your attack response strategy with the help of this download

The discovery of a network attack can throw your department into chaos--unless you're ready with a plan for resecuring your systems. Learn what steps to take after you've been hacked and see how you can prevent future attacks.


High-stress situations—like a hacker attack—will either bring out the best or the worst in a net admin. In the heat of the moment, it's tough to remember all the details and determine the best way to handle a delicate situation. But if you've armed yourself with a plan, you'll be much more likely to make the right decisions and take the appropriate steps if an attack does occur. That's where this download comes in.

To help ensure that you're ready to respond to an attack and resecure your systems, we've gathered Robert Bogue's three-part series, "You've been hacked," into one downloadable resource. Bogue provides advice on what to do in the first five minutes, the first hour, and the first week after your systems have been compromised.

About the download
The articles in this download cover such topics as how to image your systems to preserve a record, how to evaluate systems to detect tampering, and how to rebuild compromised systems. To prevent future attacks, Bogue offers pointers on patching vulnerabilities, establishing monitoring, and performing an external security audit.

About the author
TechRepublic author Robert Bogue is a strategic consultant for Crowe Chizek, with several certifications under his belt (MCSE [NT4/W2K], MCSA, A+, Network+, Server+, I-Net+, IT Project+, E-Biz+, CDIA+). He has contributed to more than 100 books and frequently writes articles about technical issues, including networking, certification, and Microsoft applications and business needs.

What resources do you need?
What other article collections would make a useful download? Send us your suggestions or post them in the discussion below.

 

High-stress situations—like a hacker attack—will either bring out the best or the worst in a net admin. In the heat of the moment, it's tough to remember all the details and determine the best way to handle a delicate situation. But if you've armed yourself with a plan, you'll be much more likely to make the right decisions and take the appropriate steps if an attack does occur. That's where this download comes in.

To help ensure that you're ready to respond to an attack and resecure your systems, we've gathered Robert Bogue's three-part series, "You've been hacked," into one downloadable resource. Bogue provides advice on what to do in the first five minutes, the first hour, and the first week after your systems have been compromised.

About the download
The articles in this download cover such topics as how to image your systems to preserve a record, how to evaluate systems to detect tampering, and how to rebuild compromised systems. To prevent future attacks, Bogue offers pointers on patching vulnerabilities, establishing monitoring, and performing an external security audit.

About the author
TechRepublic author Robert Bogue is a strategic consultant for Crowe Chizek, with several certifications under his belt (MCSE [NT4/W2K], MCSA, A+, Network+, Server+, I-Net+, IT Project+, E-Biz+, CDIA+). He has contributed to more than 100 books and frequently writes articles about technical issues, including networking, certification, and Microsoft applications and business needs.

What resources do you need?
What other article collections would make a useful download? Send us your suggestions or post them in the discussion below.

 

Editor's Picks