Quick Glossary: Cybersecurity Attack Response and Mitigation
Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared.
This quick glossary, created by Mark W. Kaelin for TechRepublic Premium, explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack.
Familiarity with the terminology will help you save and protect your sensitive business data.
Featured definition from the glossary:
Evidence collection policy
To form a basis for criminal proceedings after a network security breach, an organization should have a systematic plan for discovering, collecting, cataloging and securing evidence. Evidence may include documents, logs, software or hardware. The evidence collection policy should be clear and unequivocal.
Increase your cybersecurity knowledge with our in-depth 10-page PDF glossary. Previously priced at $29, this is now available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription. Click here to find out more.
TIME SAVED: Crafting this content required 20 hours of dedicated writing, editing and research.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.