What do we need?
Discouraging / Preventing Intrusion
Detecting Intrusions
Some Sample Intrusions
Steps for Incident Handling
Policies for handling Intrusions
Procedures for Intrusions
Who knows what else we need?
Previous slide
Next slide
Back to first slide
View graphic version