What needs to be done after a cyber attack

What needs to be done after a cyber attack. In the previous article (here and here), we have discussed a way to identify that our system was attacked by somebody, either the attack was successful or not. next question is What needs to be done after a cyber attack / during the attack (if you know its currently happening where you are watching what they are doing through the log file). (more…)...
Read More
How to identify a cyber attack

How to identify a cyber attack

If somebody is doing something that could harm you physically, then you will know immediately that the person is attacking you by seeing the movement that he/she is doing. So the processes are: receive input (incoming movement), analyse it (is it an attack or not), and decide the action. very simple :-). This article will discuss topic about How to identify a cyber attack. In the previous article, we have discussed several types of attack on cyber world. Now, the next question is, how to identify a cyber attack on my system / network? (more…)...
Read More