EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 1 : Computer Forensics in Today's World
         
Notes available : 31 You are not logged in.
Please Login for track your learning progress
   
 
Sl.No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Note No.



Bookmark this Note
Note ID: 135

Incident Response and its Process Flow


If you want to share the link of this note, please click here to "Copy note link" and share that generated link. Link from URL may change in future.
 


Incident response is a process of responding to incidents that may have occurred due to security breach in the system or network. The goal is to handle the incidents in a way that minimizes the damage and reduces recovery time and costs. It is performed by the Computer Incident Response Team (CIRT) of an organization, which is responsible for identifying how a breach occurred, how to locate the method of breach, and how to mitigate the breach.

Incident response combines various cybersecurity processes under a single procedure for combating incidents and to ensure a quicker response, better control and management, ease of communication, improved use of resources, even distribution of tasks, efficient reporting, and so on.

The steps of the Incident Response process flow are listed below:

▪ Step 1: Preparation for Incident Handling and Response

▪ Step 2: Incident Recording and Assignment

▪ Step 3: Incident Triage

o Incident analysis and validation

o Incident classification

o Incident prioritization

▪ Step 4: Notification

▪ Step 5: Containment

▪ Step 6: Evidence Gathering and Forensic Analysis

▪ Step 7: Eradication

▪ Step 8: Recovery

▪ Step 9: Post-Incident Activities

o Incident documentation

o Incident impact assessment

o Review and revise policies:

o Close the investigation

o Incident disclosure




  Go to notes  






WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations