Please use APA style formatting.
Question 1
Effective intrusion response is vital to preventing additional compromise to an organization’s network. Please use the table you prepared for question 1 of Homework 1. Assume that you are the incident response coordinator of the Equifax. What would be your intrusion responses, if you noticed the action of hackers at each step of cyber kill chain? Provide intrusion response actions to the table below.
Cyber Kill Chain Step | Intrusion Response Steps |
When you noticed hacker reconnaissance actions | |
When you noticed hacker weaponization actions | |
When you noticed hacker delivery actions | |
When you noticed hacker exploitation actions | |
When you noticed hacker installation actions | |
When you noticed hacker command & control actions | |
When you noticed hacker actions on objectives actions |
H12