An Introduction To Computer Forensics
How did it happen? How can this be prevented from happening again in the future? Obviously, there are no easy answers to this, and depending on the severity of the Cyber-attack, it could take weeks and even months to determine the answers to these two questions. Regarding the latter, this can be answered via the means of conducting various, in depth penetration testing exercises. In this regard, once the lines of defense have been beefed up, these tests can push these defense mechanisms to their absolute breaking point, to determine and uncover any hidden weaknesses or holes....