SlideShare a Scribd company logo
1 of 1
Download to read offline
The process include many steps which could be planning and preparation, detection of incident,
initial response, Formulation of response strategy, Foresnsics backups, investigation,
Implementation of security measures , Network monitoring, Recovery, reporting and final is
follow up.
Action or an event never happens on a prescribed or convenient time hence a its always to have a
checklist in place and be prepared like what time the issue happend,who reported etc.
Then to analyse the situation and which might requite forensics software and other environment
support which helps in analysis, gathering and understanding of evidence.
And the most important part is duplication which is accomplised by creating duplicate bit by bit
to a hard drive.And there are basically two approaches of doing so one is software based and
another is hardware based.And in this place hardware based approach has upper hand as it
provides speed and integrity.Also it provided the confidence of less risk of data gettting
corrupted.
Solution
The process include many steps which could be planning and preparation, detection of incident,
initial response, Formulation of response strategy, Foresnsics backups, investigation,
Implementation of security measures , Network monitoring, Recovery, reporting and final is
follow up.
Action or an event never happens on a prescribed or convenient time hence a its always to have a
checklist in place and be prepared like what time the issue happend,who reported etc.
Then to analyse the situation and which might requite forensics software and other environment
support which helps in analysis, gathering and understanding of evidence.
And the most important part is duplication which is accomplised by creating duplicate bit by bit
to a hard drive.And there are basically two approaches of doing so one is software based and
another is hardware based.And in this place hardware based approach has upper hand as it
provides speed and integrity.Also it provided the confidence of less risk of data gettting
corrupted.

More Related Content

Similar to The process include many steps which could be planning and preparati.pdf

Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionIJERA Editor
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comphanleson
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxcherishwinsland
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D cscpconf
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsPhil Huggins FBCS CITP
 
10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps SecurityDev Software
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Crew
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Frances Coronel
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-PolicyYigal Behar
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaDavid Kearney
 

Similar to The process include many steps which could be planning and preparati.pdf (20)

Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Automated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data AcquisitionAutomated Live Forensics Analysis for Volatile Data Acquisition
Automated Live Forensics Analysis for Volatile Data Acquisition
 
Ch08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.comCh08 8 Information Security Process it-slideshares.blogspot.com
Ch08 8 Information Security Process it-slideshares.blogspot.com
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Operations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docxOperations SecurityWeek 5Incident Management, Investigatio.docx
Operations SecurityWeek 5Incident Management, Investigatio.docx
 
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
SECURE SERVICES: INTEGRATING SECURITY DIMENSION INTO THE SA&D
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security10 Best Practices for Implementing DevOps Security
10 Best Practices for Implementing DevOps Security
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)Security in the Software Development Life Cycle (SDLC)
Security in the Software Development Life Cycle (SDLC)
 
Incident-Response-Policy
Incident-Response-PolicyIncident-Response-Policy
Incident-Response-Policy
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 

More from anokhilalmobile

option E .Na2co3 hydrolysyes and gives NaoH which.pdf
                     option E .Na2co3 hydrolysyes and gives NaoH which.pdf                     option E .Na2co3 hydrolysyes and gives NaoH which.pdf
option E .Na2co3 hydrolysyes and gives NaoH which.pdfanokhilalmobile
 
non polar molecules such as lipids and cholestrol.pdf
                     non polar molecules such as lipids and cholestrol.pdf                     non polar molecules such as lipids and cholestrol.pdf
non polar molecules such as lipids and cholestrol.pdfanokhilalmobile
 
moles = molarity x volume = 4.25 molL x 2.50 L =.pdf
                     moles = molarity x volume = 4.25 molL x 2.50 L =.pdf                     moles = molarity x volume = 4.25 molL x 2.50 L =.pdf
moles = molarity x volume = 4.25 molL x 2.50 L =.pdfanokhilalmobile
 
Londondispersionvan der Waals forces - these ar.pdf
                     Londondispersionvan der Waals forces - these ar.pdf                     Londondispersionvan der Waals forces - these ar.pdf
Londondispersionvan der Waals forces - these ar.pdfanokhilalmobile
 
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdfanokhilalmobile
 
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdf
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdfYou ordered a chest X-ray and saw fluid buildup in her right lung. S.pdf
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdfanokhilalmobile
 
why would you be the best candidate for the nursing programSTATEM.pdf
why would you be the best candidate for the nursing programSTATEM.pdfwhy would you be the best candidate for the nursing programSTATEM.pdf
why would you be the best candidate for the nursing programSTATEM.pdfanokhilalmobile
 
when the data value is passed between two different operating system.pdf
when the data value is passed between two different operating system.pdfwhen the data value is passed between two different operating system.pdf
when the data value is passed between two different operating system.pdfanokhilalmobile
 
Using mathematical induction,STEP 1The base n = 1 is clearl.pdf
Using mathematical induction,STEP 1The base n = 1 is clearl.pdfUsing mathematical induction,STEP 1The base n = 1 is clearl.pdf
Using mathematical induction,STEP 1The base n = 1 is clearl.pdfanokhilalmobile
 
The FCPA established criminal and civil penalties for unlawful payme.pdf
The FCPA established criminal and civil penalties for unlawful payme.pdfThe FCPA established criminal and civil penalties for unlawful payme.pdf
The FCPA established criminal and civil penalties for unlawful payme.pdfanokhilalmobile
 
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdf
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdfThe answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdf
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdfanokhilalmobile
 
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdf
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdfSpontaneous mutation rates depend on the rate at which DNA transcrip.pdf
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdfanokhilalmobile
 
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdf
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdfSales revenue100000Less- COGS60000Gross profit40000Opera.pdf
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdfanokhilalmobile
 
D) Counterclockwise answer .pdf
                     D) Counterclockwise answer                       .pdf                     D) Counterclockwise answer                       .pdf
D) Counterclockwise answer .pdfanokhilalmobile
 
Please give the differential equation and boundary conditions.So.pdf
Please give the differential equation and boundary conditions.So.pdfPlease give the differential equation and boundary conditions.So.pdf
Please give the differential equation and boundary conditions.So.pdfanokhilalmobile
 
Point.javapublic class Point {    int x,y;    double m,n; .pdf
Point.javapublic class Point {    int x,y;    double m,n; .pdfPoint.javapublic class Point {    int x,y;    double m,n; .pdf
Point.javapublic class Point {    int x,y;    double m,n; .pdfanokhilalmobile
 
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdf
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdfpKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdf
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdfanokhilalmobile
 
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdf
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdfnaphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdf
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdfanokhilalmobile
 
Ken is employing Correlational research methodSolutionKen is e.pdf
Ken is employing Correlational research methodSolutionKen is e.pdfKen is employing Correlational research methodSolutionKen is e.pdf
Ken is employing Correlational research methodSolutionKen is e.pdfanokhilalmobile
 

More from anokhilalmobile (20)

option E .Na2co3 hydrolysyes and gives NaoH which.pdf
                     option E .Na2co3 hydrolysyes and gives NaoH which.pdf                     option E .Na2co3 hydrolysyes and gives NaoH which.pdf
option E .Na2co3 hydrolysyes and gives NaoH which.pdf
 
non polar molecules such as lipids and cholestrol.pdf
                     non polar molecules such as lipids and cholestrol.pdf                     non polar molecules such as lipids and cholestrol.pdf
non polar molecules such as lipids and cholestrol.pdf
 
moles = molarity x volume = 4.25 molL x 2.50 L =.pdf
                     moles = molarity x volume = 4.25 molL x 2.50 L =.pdf                     moles = molarity x volume = 4.25 molL x 2.50 L =.pdf
moles = molarity x volume = 4.25 molL x 2.50 L =.pdf
 
Londondispersionvan der Waals forces - these ar.pdf
                     Londondispersionvan der Waals forces - these ar.pdf                     Londondispersionvan der Waals forces - these ar.pdf
Londondispersionvan der Waals forces - these ar.pdf
 
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf
[H2SO4] = 0 because H2SO4 is a strong acid. first consider Ka2.pdf
 
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdf
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdfYou ordered a chest X-ray and saw fluid buildup in her right lung. S.pdf
You ordered a chest X-ray and saw fluid buildup in her right lung. S.pdf
 
why would you be the best candidate for the nursing programSTATEM.pdf
why would you be the best candidate for the nursing programSTATEM.pdfwhy would you be the best candidate for the nursing programSTATEM.pdf
why would you be the best candidate for the nursing programSTATEM.pdf
 
when the data value is passed between two different operating system.pdf
when the data value is passed between two different operating system.pdfwhen the data value is passed between two different operating system.pdf
when the data value is passed between two different operating system.pdf
 
Using mathematical induction,STEP 1The base n = 1 is clearl.pdf
Using mathematical induction,STEP 1The base n = 1 is clearl.pdfUsing mathematical induction,STEP 1The base n = 1 is clearl.pdf
Using mathematical induction,STEP 1The base n = 1 is clearl.pdf
 
The FCPA established criminal and civil penalties for unlawful payme.pdf
The FCPA established criminal and civil penalties for unlawful payme.pdfThe FCPA established criminal and civil penalties for unlawful payme.pdf
The FCPA established criminal and civil penalties for unlawful payme.pdf
 
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdf
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdfThe answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdf
The answer is(B.) H- and (C.) NH3Lewis bases are electron pair .pdf
 
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdf
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdfSpontaneous mutation rates depend on the rate at which DNA transcrip.pdf
Spontaneous mutation rates depend on the rate at which DNA transcrip.pdf
 
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdf
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdfSales revenue100000Less- COGS60000Gross profit40000Opera.pdf
Sales revenue100000Less- COGS60000Gross profit40000Opera.pdf
 
D) Counterclockwise answer .pdf
                     D) Counterclockwise answer                       .pdf                     D) Counterclockwise answer                       .pdf
D) Counterclockwise answer .pdf
 
Please give the differential equation and boundary conditions.So.pdf
Please give the differential equation and boundary conditions.So.pdfPlease give the differential equation and boundary conditions.So.pdf
Please give the differential equation and boundary conditions.So.pdf
 
Point.javapublic class Point {    int x,y;    double m,n; .pdf
Point.javapublic class Point {    int x,y;    double m,n; .pdfPoint.javapublic class Point {    int x,y;    double m,n; .pdf
Point.javapublic class Point {    int x,y;    double m,n; .pdf
 
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdf
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdfpKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdf
pKa of H2PO4- is = 7.21According to Hendersons Equation ,pH = .pdf
 
Covalent bonds .pdf
                     Covalent bonds                                   .pdf                     Covalent bonds                                   .pdf
Covalent bonds .pdf
 
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdf
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdfnaphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdf
naphthalene, dry ice (solid co2),iodine(gentle heating), arsenic (At.pdf
 
Ken is employing Correlational research methodSolutionKen is e.pdf
Ken is employing Correlational research methodSolutionKen is e.pdfKen is employing Correlational research methodSolutionKen is e.pdf
Ken is employing Correlational research methodSolutionKen is e.pdf
 

Recently uploaded

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 

Recently uploaded (20)

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 

The process include many steps which could be planning and preparati.pdf

  • 1. The process include many steps which could be planning and preparation, detection of incident, initial response, Formulation of response strategy, Foresnsics backups, investigation, Implementation of security measures , Network monitoring, Recovery, reporting and final is follow up. Action or an event never happens on a prescribed or convenient time hence a its always to have a checklist in place and be prepared like what time the issue happend,who reported etc. Then to analyse the situation and which might requite forensics software and other environment support which helps in analysis, gathering and understanding of evidence. And the most important part is duplication which is accomplised by creating duplicate bit by bit to a hard drive.And there are basically two approaches of doing so one is software based and another is hardware based.And in this place hardware based approach has upper hand as it provides speed and integrity.Also it provided the confidence of less risk of data gettting corrupted. Solution The process include many steps which could be planning and preparation, detection of incident, initial response, Formulation of response strategy, Foresnsics backups, investigation, Implementation of security measures , Network monitoring, Recovery, reporting and final is follow up. Action or an event never happens on a prescribed or convenient time hence a its always to have a checklist in place and be prepared like what time the issue happend,who reported etc. Then to analyse the situation and which might requite forensics software and other environment support which helps in analysis, gathering and understanding of evidence. And the most important part is duplication which is accomplised by creating duplicate bit by bit to a hard drive.And there are basically two approaches of doing so one is software based and another is hardware based.And in this place hardware based approach has upper hand as it provides speed and integrity.Also it provided the confidence of less risk of data gettting corrupted.