Career and Technical Education (2022) Grade(s): 10-12 - Information Technology
CTE22.IT.C3.10a
Describe the activities that make up the detection and analysis phase of the incident response life cycle, including identification of indication sources, analysis of an intrusion event, documentation, and notification of the incident.
Describe the activities that make up the detection and analysis phase of the incident response life cycle, including identification of indication sources, analysis of an intrusion event, documentation, and notification of the incident.
COS Examples
Examples: unusual outbound network traffic or geographical irregularities, which indicate a possible breach or compromise