Abstract
In addition to identifying suspicious messages, you need to have a plan to respond appropriately. Several frameworks or models exist to help support and lead the response efforts. The Sans.org organization has created the easiest and most relevant framework, PICERL, which is explained in this chapter. First, let’s discuss some terms that help us better understand this framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Oles, N. (2023). Incident Response. In: How to Catch a Phish. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9361-4_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-9361-4_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-9360-7
Online ISBN: 978-1-4842-9361-4
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)