Quick Glossary: Cybersecurity Attack Response and Mitigation
Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared.
This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack.
From the glossary:
EVIDENCE COLLECTION POLICY
To form a basis for criminal proceedings after a network security breach, an organization should have a systematic plan for discovering, collecting, cataloging and securing evidence. Evidence may include documents, logs, software or hardware. The evidence collection policy should be clear and unequivocal.
The download comprises a 10-page PDF.
Previously priced at $49, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.