␡
- Understanding Key Points of the Follow-Up Phase
- Acquiring the Evidence
- Authenticating, Preserving, and Analyzing Incident Data
- Conducting Post-Incident Activities
- Using Legal, Investigative, and Government Recourses
- Article Series
- References
- Acknowledgments
- About the Author
- Ordering Sun Documents
- Accessing Sun Documentation Online
Like this article? We recommend
Article Series
The "Responding to a Customer's Security Incidents" articles are an on-going series. The next article will cover best practices for processing incident data. It will discuss authenticating, preserving, and analyzing the data, determining the depth of the analysis and response plan, and understanding the essentials of forensics. The article also includes discussions on publicly available tools for forensic analysis.