Cyber Incident Response Guide (Personal): Difference between revisions
fixed links |
linked section |
||
Line 8: | Line 8: | ||
== Identify the incident == | == Identify the incident == | ||
The first step in responding to a cyber incident is identifying what happened. The steps you take may vary depending on the nature of the incident. Here are some guidelines to help you identify different types of cyber incidents: | The first step in responding to a cyber incident is identifying what happened. The steps you take may vary depending on the nature of the incident. Here are some guidelines to help you identify different types of cyber incidents: | ||
* Monitor | * [[#Monitor|Monitor]] | ||
* '''Identify''' | * '''[[#Identify|Identify]]''' | ||
* Secure | * [[#Secure|Secure]] | ||
* Restore | * [[#Restore|Restore]] | ||
* Report | * [[#Report|Report]] | ||
* Learn | * [[#Learn|Learn]] | ||
* Monitor | * [[#Monitor|Monitor]] | ||
== Possible Hack == | == Possible Hack == |