Summary
In this chapter, we learned more about how to handle an eventual attack, how to divide the attack into different phases, how we should proceed in terms of notifying people within the organization and the authorities, and some of the ways to look for technical evidence of compromise.
It is important to note that the techniques mentioned in this chapter are just a few examples of the methods that are commonly used. The key to effective IT security is having the right tools to provide insights when needed, as well as staying up to date on the latest vulnerabilities and attack methods. The threat landscape is constantly evolving, so it is crucial to keep track of current threats. This will be discussed further in the next chapter.