SOC Experts Community - Beta
0 like 0 dislike
62 views
in Use Cases by (120 points)
1) Where it has been occurred and how to detect ?
2) How it has been entered? (MEDIUM)
3) What are the malicious activities occurred  after the entry ?
4) when it has been occured ?
5) who did it ?
6) what are the intension ?
7) Harm made to the organisation?
8) what are the measures taken ?
9) Future precautions  ?

Your answer

Your name to display (optional):
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please log in or register.

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses

Categories

...