Readings from Incident Response & Disaster Recovery Chapter 4.
How do you reconcile the need to treat much of the information in the plan as company confidential information, yet at the same time ensure that the plan is readily available when an attack occurs?
How do you garner top-level executive commitment to ensure the participation of all levels of managers and to gain support in encouraging all members of the organization to take ownership of the task of protecting information?
What are some of available software intrusion detection systems, what do they offer, how useful and should all companies acquire one?
Please make the language basic international writing thanks