- Prepare, which includes risk analysis and development of policies, controls and training.
- Detect, which includes monitoring configuration, detecting intrusion and anomalies and sharing threat information.
- Analyze, which includes incident management, correlation and human analysis.
- Respond, which includes containment, evidence gathering, recovery, forensics and prevention. . . ." (read more at link above)
more news below
Post a Comment