![]() | ![]() |
business: containment
technical: clean-up technical: cybersecurity
Computer Quarantinesby Brent Kirkpatrick (Date Published: 2/27/2018.)
The steps of quarantine for a hacked computer are
![]() After successful quarantine, the remainder of the network will be safe from the intrusions that originated from the quarantined computer. This makes quarantine an essential step in the containment process. Indeed, cycles of escalating quarantine for multiple computers are usually required for containment. Part of successful quarantine might involve patching some computers in the network and updates to firewall rules.
![]() defendIT (TM). AI-driven security measures derived from security incident data.
Business Articles
Rapid Containment of Intrusions
|