The Head of IT Security has been asked to conduct a detailed forensic analysis of a suspected data breach that ted to customer credit card details being intercepted.
Which TWO of the following would be suitable objectives for such a forensic analysis?
Currently there are no comments in this discussion, be the first to comment!