Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
| I l @ ve RuBoard |
| Assess the scope of the damage. This allows you to isolate the compromised systems and data and begin the process of determining the cause, nature, and extent of the attack. |
| I l @ ve RuBoard |