Internet And Computer Security: Recovering From An IntrusionIn spite of all the technological and human-based solutions set up in order to prevent incidents, a computer security breach might still go undetected and lead to an intrusion. In this case, there are several steps that an organization should take in order to mitigate the damages, from both a legal and technical standpoint.
The following questions have been addressed in this article:From a legal standpoint, what can be done to anticipate the attack?
Practically, what can be done in case of intrusion?
What legal steps can be taken after the intrusion?
What else can be done to prepare for litigation?