Self-taught and motivated software engineer with a passion for security. I love solving problems and I believe computer science can solve all of our problems and is the answer to all our questions.
Lessons Learned in Incident Handling
What happened and how can we improve our capabilities. Immediately after the system is back online in production start developing a follow-up report.
Recovery in Incident Handling
Back to business, as usual, is the goal in the recovery phase of incident handling. Putting systems back into production in a safe manner is important.
Eradication in Incident Handling
With the bleeding stopped, the goal of the eradication phase is to rid the system of any and all artifacts created by the attacker.
Containment in Incident Handling
isolate the threat to stop the attack from spreading to other systems or causing more damage.
Identification in Incident Handling
Identification phase of incident handling involves detecting threats, vulnerabilities, and security incidents.
Preparation in Incident Handling.
Security professionals will spend most of their time in the preparation and identification phases of the incident handling process. I'll be covering People, policy, data, software, communications, supplies, environment, and documentation of the preparation phase.
Incident Handling
Incident handling is a plan of action for dealing with intrusions, cyber-theft, denial of service or any other information security-related events.
The Staircase problem
The following problem is from hacker rank...
Consider a staircase