Compromised systems
In this scenario, an organization is alerted that one or more of their systems was
compromised by an advanced cyber attack technique such as a watering hole,
phishing, brute force, or an SQL injection.
Objectives
To solve the problem in these investigations, the organization has these objectives:
v
Determine the extent of the compromise within the organization.
v
Understand the type of operational risk of the compromise on each system.
v
Uncover any peripheral actions that the initial attack did to circumvent cleanup
activities and detection.
Do'stlaringiz bilan baham: |