Practical UNIX & Internet Security

Practical UNIX & Internet SecuritySearch this book
Previous: 24.6 Resuming OperationChapter 24
Discovering a Break-in
Next: 25. Denial of Service Attacks and Solutions
 

24.7 Damage Control

If you've already restored the system, what damage is there to control? Well, the aftermath, primarily. You need to follow through on any untoward consequences of the break-in. For instance, was proprietary information copied? If so, you need to notify your legal counsel and consider what to do.

You should determine which of the following concerns need to be addressed:

The answers to the above questions will vary from situation to situation and incident to incident. We'll cover a few of them in more detail in succeeding chapters.


Previous: 24.6 Resuming OperationPractical UNIX & Internet SecurityNext: 25. Denial of Service Attacks and Solutions
24.6 Resuming OperationBook Index25. Denial of Service Attacks and Solutions