The paper comprises of instructions to identify cyber-threats through the Indicators of Compromise, and devising strategies to mitigate the impact of the same. The response plan is divided into five steps of Identification, Notification, Analysis, Containment/Eradication and Recovery. The paper focuses on five common incidents that are:
- Phishing Email with Malware in attachment
- Phishing Email with Credential Harvesting Web Link
- Lost Laptop inciden from an Employee
- System Alert for USB inserted on Employee Machine
- Ransom note received in Email with threat of DDOS attack on company