This document describes the steps to be taken during a cyber security incident response.
For purposes of this plan, our Security Team consists of Roberta and Matthew.
- Immediately change relevant passwords
d. System abuse procedure
f. Property theft response procedure
g. Website denial of service response procedureI. Report attack to webhost DAthorn (contact info in IT Glue)II. Disable web site until malware can be cleaned up by member of security team
h. Database or file denial of service response procedure