Once they made sure that the attackers do not have access in their system, the security administrators decided to proceed with the forensic analysis. They concluded that their access security system was not designed tor threat detection, including the detection of malicious files which could be the cause of possible future attacks.
Based on these findings. Texas H$H inc, decided to modify its access security system to avoid future incidents and integrate an incident management policy in their Information security policy that could serve as guidance for employees on how to respond to similar incidents.
Based on the scenario above, answer the following question:
Texas M&H Inc. decided to integrate the incident management policy to the existent information security policy. How do you define this situation?
Alverta
11 months agoSalina
10 months agoEloisa
11 months agoGraciela
11 months agoBernadine
12 months agoJackie
12 months agoFrance
10 months agoJoaquin
10 months agoVivan
11 months agoJustine
11 months agoKeith
12 months agoQuentin
12 months agoLeota
11 months agoAmmie
11 months agoMelynda
1 years agoLeonor
1 years agoDahlia
11 months agoAnisha
12 months agoJoanne
1 years agoJuliana
1 years agoCoral
12 months agoPortia
12 months agoAntonio
12 months agoMarge
1 years ago