Use your computer fearlessly.

Mission Services Articles Research

business: containment

technical: clean-up

technical: cybersecurity

Computer Quarantines

by Brent Kirkpatrick

(Date Published: .)

Quarantining hacked computers is often necessary to contain hacking.

The act of isolating infected computers can save other computers from being hacked. Quarantine occurs in degrees: from powering-down an infected machine to using firewalls to block the intrusive communications.

The steps of quarantine for a hacked computer are

  • disable wireless
  • unplug the ethernet network
  • turn off the computer
  • investigate to determine which protocols and ports are producing intrusions
This is a list of escalating steps for quarantine.

Cartoon: computer with sign Danger, Quarantine Area

After successful quarantine, the remainder of the network will be safe from the intrusions that originated from the quarantined computer. This makes quarantine an essential step in the containment process.

Indeed, cycles of escalating quarantine for multiple computers are usually required for containment. Part of successful quarantine might involve patching some computers in the network and updates to firewall rules.

defendIT image

defendIT (TM). AI-driven security measures derived from security incident data.

Technical Articles

Why Clean-up Hacking?

Business Articles

Rapid Containment of Intrusions

INC Logo

What Is New? | Contact | Tips

© 2015-2021 Intrepid Net Computing. All rights reserved.