Download now Free registration required
The 10 pointers for containing computer incidents listed above are high-level in nature, non-industry-specific, and applicable to most IT environments. These pointers are based on common containment lessons learned that Verizon Business Investigative Response must frequently overcome in the field in helping organizations respond effectively to security breach events. It should be noted that this paper is in no way intended to provide a comprehensive listing of incident containment measures. However, by understanding the concepts and applying these basic elements at the right juncture in the incident response life cycle, an organization can be better positioned to successfully stop the spread of a security breach and move more quickly into forensic analysis.
- Format: PDF
- Size: 129.1 KB