forensic investigation

Select three methods to monitor events and detect suspicious activity. Compare the relationship between security monitoring and incident response.

Security Operations Program Scenario: After the security team investigation of the Petya ransomware attack, it is determined that several critical security patches were missing from the CFO’s computer that led to the infection. Furthermore, the ransomware spread across the network to other connected systems, including the servers that manage online credit card transactions and personal […]

Scroll to top