questions


 

Hypothetical Break-In

Consider the following five questions and write a response to each one.

How do you go about finding information when you have been told that there has been a break-in?

  • What servers were compromised?
  • Was network equipment comprised?
  • What user accounts were employed to do gain access?
  • What vulnerabilities were exploited?
  • What can be done to prevent a recurrence?