"Last week, we explored methods and tools for detecting
intruders on Linux platforms. In response to several reader
inquiries, we are focusing on what an intrusion detection response
plan should consist of."
"It is impossible to create a response plan that reflects your
organization's values without an accurate risk assessment."
"After gaining the report of the intrusion, it is time to take