Access Millions of academic & study documents

Online

Content type
User Generated
Subject
Engineering
Type
Homework
Showing Page:
1/3

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Running Head: DISCUSSION 1 Discussion Student’s Name Institution Course Date DISCUSSION 2 DISCUSSION Chapter 11 was about response. The chapter discussed examples of cyber security programs like response activities, incident trigger and expert gathering. The chapter also elaborates more on the general incident response process schema. Additionally, the two types of triggers are also discussed. There are two components of incident response teams. That is the core set of people and a set of subject matters experts (Amoroso, 2013). Additionally, the chapter also discusses the management of simultaneous response cases using a diagram. The chapter also analyses some of the questions that are address in the forensic analysis process. Some of the questions addressed are state, consequences, root case and exploits. Lastly, the decision process of law enforcement in forensics is discussed ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4