Unformatted text preview: 6. With the informaTon provided in this lab, what steps would you take to prevent a reoccurrence of an external a±ack? To prevent reoccurrence, we would quaran²ne or remove any IT assets aFected by an a±ack. We would then look at how the a±ack was performed and try to patch that security hole that the a±ackers used. 7. What is a best pracTce to deter insiders from even thinking about execuTng an a±ack? Give employees only access that there is needed for their job, provide security awareness and training for all employees, monitor network logs for any unusual ac²vi²es in force straight authen²ca²on policies. Restrict access on sensi²ve data....
View Full Document
- Spring '14
- Computer Security, Attack!, attack, attacker, sensitive data, force authentication attacks