answersLogoWhite

0


Best Answer

Incident response policy

Answer Explanation: All companies should have an incident response policy. Incident response policies generally provide steps to take when security breaches occur in the work environment. Although it is impossible to define responses for all security incidents, the major types of possible incidents should be covered. Events such as external intrusions, computer hacks, and hardware damage or destruction should all be made part of an incident response policy.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What should a company make activities such as hacked computers and damaged computer hardware a part of?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Who invented the first Microsoft computer?

Nobody, there are no Microsoft computers. They are a software company, not a hardware company.


How do you investigate a case in computer forensic of fraud which internal staff logged on company's system using multiple ids on different computer and sever?

Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware.


What does the company Centered System do?

The computer software and hardware company Centered System makes many products for computers. One can purchase their products straight from their own website.


When was Point of View - computer hardware company - created?

Point of View - computer hardware company - was created in 1994.


What does INTEL involved into?

please rephrase you question.... if you mean the computer company intel and what they do is they create personal computers and tables ... hardware......there was talk that they would stop making computers and focuse on software only


Why would a business need to install network security hardware to their computer systems?

There are a wide variety of reasons why a company would want to install network security hardware to their computers. One such reason would be to prevent access to payroll information or company secrets.


What are pre-asemble computers and custom built computers?

Pre-assembled computers are factory made, usually by a known company like Dell, and come with the factory defaults for hardware and OS (Operating System). A computer would be custom built if you bought all of the parts separate and assembled the computer from scrap.


What is computer asset management?

Computer asset management is software used to track the computers and other related hardware and software owned by a business. As people leave and technology improves a company needs to keep a record of what they have and where it is.


What is the use of a computer hardware inventory software?

PC Inventory Software is used to collect data from many or all the computers connected on a network. The collection can bring up information about software and hardware and create an inventory report.


What does the company MESH Computers do?

The company MESH Computers are a computer manufacturing company. The business focuses on developing high powered PC computers from the London-based facility.


What is a Japanese multinational computer hardware and IT services company?

Fujitsu


What products does the company Origination produce?

The products that the company Origination produce is software and hardware for computers. It is rumored that this company is trying to beat out Microsoft.