Exercise
- Define cyber security incident log.
- Write the importance of maintaining the cyber security incident log.
- Explain what is the, assemble an internal team, a step of cyber security incident response plan?
- What do you understand by “external data security resources” regarding to a cyber security incident response plan?
- What do you understand by “differentiate breaches and create an action item checklist” regarding to a cyber security incident response plan?
- Write the importance of a cyber security incident response plan.
- What is a cyber security threat list. Explain it with example.
- What do you understand by prioritize security incidents based on their severity?
- What is incident response flowchart?
- What do you understand by review and update the response plan regularly?
- List the various types of security software and why we use them?
