If I was hired as an IT security consultant to fix the security problem of a manufacturing company with a budget of $1 million within 90 days, I'll begin with gathering information about the illegal access of that certain person to the company's security. After that, I would conduct a private investigation about the hacking system being used by the hackers with the help of some personalities that possesses a wild knowledge about hacking, have a consultation for the ways on how to block the used system and may track the hackers. If that step worked, it is the time to look for the damaged or destroyed systems and data in order to immediately fix and undo anything that has changed.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment