Skip to content

Sushmitapl/Incident-Response-Playbook

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

Incident-Response-Playbook

The paper comprises of instructions to identify cyber-threats through the Indicators of Compromise, and devising strategies to mitigate the impact of the same. The response plan is divided into five steps of Identification, Notification, Analysis, Containment/Eradication and Recovery. The paper focuses on five common incidents that are:

  1. Phishing Email with Malware in attachment
  2. Phishing Email with Credential Harvesting Web Link
  3. Lost Laptop inciden from an Employee
  4. System Alert for USB inserted on Employee Machine
  5. Ransom note received in Email with threat of DDOS attack on company

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published