Quick Glossary: Cybersecurity Attack Response and Mitigation

Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared.

Your computer network is under constant attack. The hard reality is that one of those cyberattacks will succeed, and you had better be prepared.

This quick glossary from TechRepublic Premium explains the terminology used by security experts as they attempt to reduce the damage caused by a successful attack.

From the glossary:

EVIDENCE COLLECTION POLICY

To form a basis for criminal proceedings after a network security breach, an organization should have a systematic plan for discovering, collecting, cataloging and securing evidence. Evidence may include documents, logs, software or hardware. The evidence collection policy should be clear and unequivocal.

The download comprises a 10-page PDF.

Previously priced at $49, this is now available to download for $29. Or free with Premium annual subscription: click here to find out more.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.