官术网_书友最值得收藏!

Incident life cycle

Every incident that starts must have an end, and what happens in between the beginning and the end are different phases that will determine the outcome of the response process. This is an ongoing process that we call the incident life cycle. What we have described until now can be considered the preparation phase. However, this phase is broader than that—it also has the partial implementation of security controls that were created based on the initial risk assessment (this was supposedly done even before creating the incident response process).

Also included in the preparation phase is the implementation of other security controls, such as:

  • Endpoint protection
  • Malware protection
  • Network security

The preparation phase is not static, and you can see in the following diagram that this phase will receive input from post-incident activity.

The other phases of the life cycle and how they interact are also shown in this diagram:

The DETECTION and CONTAINMENT phase could have multiple interactions within the same incident. Once the loop is over, you will move on to the post-incident activity phase. The sections that follow will cover these last three phases in more detail.

主站蜘蛛池模板: 巴彦淖尔市| 乌海市| 南木林县| 舟山市| 绥化市| 淅川县| 上饶市| 灵丘县| 习水县| 建始县| 哈密市| 克东县| 唐河县| 田林县| 临城县| 铜鼓县| 宾阳县| 麻栗坡县| 五原县| 平湖市| 沁阳市| 虞城县| 临沧市| 府谷县| 聊城市| 嵩明县| 库尔勒市| 牙克石市| 若尔盖县| 开江县| 翼城县| 通城县| 饶平县| 老河口市| 阜宁县| 文登市| 潜山县| 昭觉县| 大冶市| 新巴尔虎右旗| 西昌市|