SlideShare a Scribd company logo
Domain 2 – BCM, DR & Incident
Response
2.1: Incident response
2.2: Business Continuity
2.3: Disaster Recovery
Waleed Elnaggar
https://www.youtube.com/naggaracademy
Incident Response Concepts
https://www.youtube.com/naggaracademy
breach
Event
Incident
Exploit
Intrusion
Threat
Vulnerability
Zero Day
Breach
https://www.youtube.com/naggaracademy
any incident that results in unauthorized access to
computer data, applications, networks or devices. It
results in information being accessed without
authorization. Typically, it occurs when an intruder is
able to bypass security mechanisms..
Event
https://www.youtube.com/naggaracademy
Any change in everyday operations of a network or
information technology service indicating that a security
policy may have been violated or a security safeguard may
have failed. In a computing context, events include any
identifiable occurrence that has significance for system
hardware or software. Security events are those that may
have significance to the security of systems or data.
Incident
https://www.youtube.com/naggaracademy
If a security event is confirmed to have negative impact
over availability, integrity or confidentiality, the event is
termed a security incident. A security incident results in
risk or damage to the resources and assets of an
enterprise.
Exploit
https://www.youtube.com/naggaracademy
Exploits are the means through which a vulnerability can
be leveraged for malicious activity by hackers; these
include pieces of software, sequences of commands, or
even open-source exploit kits.
Intrusion
https://www.youtube.com/naggaracademy
A security event, or a combination of multiple security
events, that constitutes a security incident in which an
intruder gains, or attempts to gain, access to a system or
system resource without having authorization to do so.
Threat
https://www.youtube.com/naggaracademy
Cyber threats are harmful activities committed with the
intent of destroying, stealing, or disrupting data and digital
life in general. Computer viruses, data breaches, and
Denial of Service (DoS) assaults are examples of these
risks.
Vulnerability
https://www.youtube.com/naggaracademy
A vulnerability is a weakness in an IT system that can be
exploited by an attacker to deliver a successful attack.
They can occur through flaws, features or user error, and
attackers will look to exploit any of them, often combining
one or more, to achieve their end goal.
Zero Day
https://www.youtube.com/naggaracademy
"Zero-day" is a broad term that describes recently
discovered security vulnerabilities that hackers can use to
attack systems. The term "zero-day" refers to the fact that
the vendor or developer has only just learned of the flaw –
which means they have “zero days” to fix it. A zero-day
attack takes place when hackers exploit the flaw before
developers have a chance to address it.
Why Incident Response
https://www.youtube.com/naggaracademy
Incident response is a cornerstone of any enterprise
cybersecurity program. Quickly responding to security
incidents effectively and efficiently helps minimize damage,
improve recovery time, restore business operations and
avoid high costs.
Objective is to minimize incident impact and resume
interrupted operation asap.
Safety comes first
Incident Response Cycle
https://www.youtube.com/naggaracademy
1. Preparation
https://www.youtube.com/naggaracademy
 Formal policy / Respose plan/strategy
 Identify critical data/systems, single point of failure
 Team / Roles and responsibilities
 Training and awareness
 Communication
 Documentation
 First response
Detection & Analysis
https://www.youtube.com/naggaracademy
 Monitoring
 Incident analysis
 Prioritization
 Standardize incident documentation
Containment
https://www.youtube.com/naggaracademy
 Choose appropriate response strategy
 Isolate the impacted devices
 Recovery
 Gathering evidence (chain of custody)
Post-incident Activity
https://www.youtube.com/naggaracademy
 Lessons learned
 Formal Incident report
 Legal requirements
https://www.youtube.com/naggaracademy

More Related Content

Similar to CC 2-1 Incident response.pdf

Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
Ricardo Resnik
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
DexterJanPineda
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
Al Balqa Applied University
 
Incident-Response-and-Recovery and cloud security.pptx
Incident-Response-and-Recovery and cloud security.pptxIncident-Response-and-Recovery and cloud security.pptx
Incident-Response-and-Recovery and cloud security.pptx
SHIVASAI508232
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
IRJET Journal
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hackingjoeymar143
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Cenzic
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
Chris Bailey
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
IRJET Journal
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
Teri Radichel
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
RakeshKumar442494
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
London School of Cyber Security
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 

Similar to CC 2-1 Incident response.pdf (20)

Damballa automated breach defense june 2014
Damballa automated breach defense   june 2014Damballa automated breach defense   june 2014
Damballa automated breach defense june 2014
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Incident-Response-and-Recovery and cloud security.pptx
Incident-Response-and-Recovery and cloud security.pptxIncident-Response-and-Recovery and cloud security.pptx
Incident-Response-and-Recovery and cloud security.pptx
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for JavaJavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
 
16231
1623116231
16231
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
Research Paper
Research PaperResearch Paper
Research Paper
 

More from Waleed Elnaggar

CC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdfCC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdf
Waleed Elnaggar
 
CC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdfCC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdf
Waleed Elnaggar
 
CC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdfCC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdf
Waleed Elnaggar
 
CC 3-1 Access Control Concepts.pdf
CC 3-1 Access Control Concepts.pdfCC 3-1 Access Control Concepts.pdf
CC 3-1 Access Control Concepts.pdf
Waleed Elnaggar
 
CC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdfCC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdf
Waleed Elnaggar
 
CC 1-5 Governance.pdf
CC 1-5 Governance.pdfCC 1-5 Governance.pdf
CC 1-5 Governance.pdf
Waleed Elnaggar
 
CC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdfCC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdf
Waleed Elnaggar
 
CC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdfCC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdf
Waleed Elnaggar
 
CC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdfCC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdf
Waleed Elnaggar
 
CC 0-1 Introduction.pdf
CC 0-1 Introduction.pdfCC 0-1 Introduction.pdf
CC 0-1 Introduction.pdf
Waleed Elnaggar
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
Waleed Elnaggar
 
PMP Application - Step by Step
PMP Application - Step by StepPMP Application - Step by Step
PMP Application - Step by Step
Waleed Elnaggar
 
Shopping World - A Project Planning Case
Shopping World - A Project Planning CaseShopping World - A Project Planning Case
Shopping World - A Project Planning Case
Waleed Elnaggar
 

More from Waleed Elnaggar (13)

CC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdfCC 4-1A computer networking (Part 1).pdf
CC 4-1A computer networking (Part 1).pdf
 
CC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdfCC 3-3 Logical access controls.pdf
CC 3-3 Logical access controls.pdf
 
CC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdfCC 3-2 Physical access controls.pdf
CC 3-2 Physical access controls.pdf
 
CC 3-1 Access Control Concepts.pdf
CC 3-1 Access Control Concepts.pdfCC 3-1 Access Control Concepts.pdf
CC 3-1 Access Control Concepts.pdf
 
CC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdfCC 2-3 Disaster Recovery.pdf
CC 2-3 Disaster Recovery.pdf
 
CC 1-5 Governance.pdf
CC 1-5 Governance.pdfCC 1-5 Governance.pdf
CC 1-5 Governance.pdf
 
CC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdfCC 1-3 Security Controls.pdf
CC 1-3 Security Controls.pdf
 
CC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdfCC 1-2 Risk Management.pdf
CC 1-2 Risk Management.pdf
 
CC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdfCC 1-1 Concepts of InfoSec.pdf
CC 1-1 Concepts of InfoSec.pdf
 
CC 0-1 Introduction.pdf
CC 0-1 Introduction.pdfCC 0-1 Introduction.pdf
CC 0-1 Introduction.pdf
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
PMP Application - Step by Step
PMP Application - Step by StepPMP Application - Step by Step
PMP Application - Step by Step
 
Shopping World - A Project Planning Case
Shopping World - A Project Planning CaseShopping World - A Project Planning Case
Shopping World - A Project Planning Case
 

Recently uploaded

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

CC 2-1 Incident response.pdf