Documente Academic
Documente Profesional
Documente Cultură
YYYYMMDDII## [year,month,day,II,version]
Report Name
Location Category
1 of 5
Table of Contents
Executive Summary................................................................................................................................... 3
1.0 Initial Incident Discovery..................................................................................................................... 4
1.1 Summary...................................................................................................................................... 4
1.2 Action Items.................................................................................................................................. 4
1.3 Description of system(s) in question............................................................................................. 4
1.4 Identified Computer System(s)..................................................................................................... 4
1.5 Security Mechanisms.................................................................................................................... 4
1.6 Initial Forensic Discovery.............................................................................................................. 4
1.7 Initial Corrective Action................................................................................................................. 4
1.8 Participants................................................................................................................................... 4
2.0 Forensic Process................................................................................................................................. 4
2.1 Tools............................................................................................................................................. 4
2.2 Logs.............................................................................................................................................. 4
3.0 Results and Findings........................................................................................................................... 4
3.1 Summary...................................................................................................................................... 4
3.2 Corrective Actions......................................................................................................................... 4
3.3 Lessons Learned ......................................................................................................................... 5
2 of 5
Executive Summary
[Provide a high level overview of what has occurred.]
3 of 5
1.8 Participants
Name
Extension
Title
2.1 Tools
[What tools did you use to build your analysis?]
2.2 Logs
[Include any relevant logs or proof of system compromise]
4 of 5
5 of 5