Minimising the Impact of Cyber Attacks

Even the most Information Security conscious organisations can be attacked; this may be to 'prove a point' or for other malicious reasons.

To view the related Policy click      

  • Successful cyber attacks are likely to result in either a loss or corruption / theft of data, and possibly the disabling of services.

  1. Disable and log off a specific user account to prevent access.
  2. Disable and log off a group of user accounts which access a particular service that is being attacked.
  3. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
  4. Disable specific applications, for example, an e-mail system subjected to a SPAM attack.
  5. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.


Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page