Career and Technical Education (2022) Grade(s): 10-12 - Information Technology

CTE22.IT.C3.10a

Describe the activities that make up the detection and analysis phase of the incident response life cycle, including identification of indication sources, analysis of an intrusion event, documentation, and notification of the incident.

COS Examples

Examples: unusual outbound network traffic or geographical irregularities, which indicate a possible breach or compromise

ALSDE LOGO