
Download
File | |
---|---|
eForensics Magazine 2016 09 Preview.pdf |
Subscriber? Click here to download the whole issue
FULL ARTICLE INSIDE
Ten Lessons for Incident Response
The author of the article requested to remain anonymous. During the presented events they were holding the position of System Infrastructure Manager.
It started with an email. There was an odd amount of traffic from our Primary Data Center to the IP of some non-descript website. I had a Blackberry at the time and felt safe checking out the site to see if it was obviously malicious. It was a Sunday, I was in the car with the family and the website didn’t seem threatening at first blush. I replied that this could wait until Monday morning to dive deeper and find out what was wrong.
Download
File | |
---|---|
eForensics Magazine 2016 09 Preview.pdf |
Subscribe
Login
0 Comments