Quick Glossary: Cybersecurity Attack Response and Mitigation

Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared.

This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack.

From the glossary:

EVIDENCE COLLECTION POLICY

To form a basis for criminal proceedings after a network security breach, an organization should have a systematic plan for discovering, collecting, cataloging and securing evidence. Evidence may include documents, logs, software or hardware. The evidence collection policy should be clear and unequivocal.

The download comprises a 10-page PDF.

Previously priced at $49, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.

Resource Details

or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.

Provided by:
TechRepublic Premium
Published:
August 9, 2023
Topic:
TechRepublic Premium
Format:
PDF
or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.