Cyber-security

Analysis of the Attacked Vectors in Cyber-security

Analysis of the Attacked Vectors in Cyber-security  Analyze the Red Team’s report to determine what they attacked or what attack vectors were used. Next, analyze the environment to determine what types of forensic evidence should be collected after the attack(s) and where that evidence can be collected from.At a minimum your plan must document evidence … Read more