Incident Response Plan Word Version

Business Applications. Monitors business applications and services for signs of attack. Reviews audit logs of mission-critical servers for signs of suspicious activity. Contacts the Information Technology Operations Center with any information relating to a suspected breach ................
................