Exercise

  1. Define cyber security incident log.
  2. Write the importance of maintaining the cyber security incident log.
  3. Explain what is the, assemble an internal team, a step of cyber security incident response plan?
  4. What do you understand by “external data security resources” regarding to a cyber security incident response plan?
  5. What do you understand by “differentiate breaches and create an action item checklist” regarding to a cyber security incident response plan?
  6. Write the importance of a cyber security incident response plan.
  7. What is a cyber security threat list. Explain it with example.
  8. What do you understand by prioritize security incidents based on their severity?
  9. What is incident response flowchart?
  10. What do you understand by review and update the response plan regularly?
  11. List the various types of security software and why we use them?