COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Associated issues of ‘Computer crime’ is since phase what until what phase?
|
Since phase 1
|
|
from phase 2 until phase 3 only
|
|
from phase 2 until phase 4
|
|
None of the above
|
Explanation:
Detailed explanation-1: -The NIST incident response lifecycle breaks incident response down into four main phases: Preparation; Detection and Analysis; Containment, Eradication, and Recovery; and Post-Event Activity.
Detailed explanation-2: -Containment, Eradication, & Recovery. The purpose of the containment phase is to halt the effects of an incident before it can cause further damage.
There is 1 question to complete.