Hypothetical Break-In
Consider the following five questions and write a response to each one.
How do you go about finding information when you have been told that there has been a break-in?
- What servers were compromised?
- Was network equipment comprised?
- What user accounts were employed to do gain access?
- What vulnerabilities were exploited?
- What can be done to prevent a recurrence?