IV. Intrusions and Incident Response
It is inevitable that a network falls to intrusion or malicious use
of network resources. This part discusses some proactive measures an
administrator can take to prevent security breaches, such as forming an
emergency response team capable of quickly and effectively responding to
security issues. This part also details the steps an administrator can
take to collect and analyze evidence of a security breach after the
fact.