In the course of responding 10 an information security incident, the BEST way to treat evidence for possible legal action is defined by:
Senior management has approved employees working off-site by using a virtual private network (VPN) connection. It is MOST important for the information security manager to periodically:
When designing the technical solution for a disaster recovery site, the PRIMARY factor that should be taken into consideration is the:
To determine how a security breach occurred on the corporate network, a security manager looks at the logs of various devices. Which of the following BEST facilitates the correlation and review of these logs?
A computer incident response team (CIRT) manual should PRIMARILY contain which of the following documents?