Hypothetical Break-In

 

 

 

 

 

Consider the following five questions and write a response to each one.

How do you go about finding information when you have been told that there has been a break-in?

What servers were compromised?
Was network equipment comprised?
What user accounts were employed to do gain access?
What vulnerabilities were exploited?
What can be done to prevent a recurrence?

Leave a Comment

Your email address will not be published. Required fields are marked *

Our customer support team is here to answer your questions. Ask us anything!