Malware Identification Decision Tree |
6. Symantec Specific Analysis Steps |
6.1. Identify the Threat and Attack Vectors | |
6.2. Identify the Infected Computers | |
6.3. Quarantine the Infected Computers | |
6.4. Clean the Computers Infected | |
6.5. Post-op Prevent Recurrence |
1. Suspect Worm |
2. Suspect Advanced Persistent Threat |
3. Incident Response Phases |
4. Suspect Virus |
5. Suspect Trojan |
7. Information References |
Source of some of this information: http://service1.symantec.com/support/ent-security.nsf/854fa02b4f5013678825731a007d06af/52f4f4d80ac9a7b2882576ac0067121c?OpenDocument