Ransomware

Encryption-based extortion attack targeting files, databases, or entire systems with ransom demands for decryption keys.

Triage

4 procedures

Containment

4 procedures
Sponsored

Preservation

4 procedures

Collection

4 procedures

Analysis

5 procedures

Eradication

5 procedures

Recovery

4 procedures

Post-Incident Review

4 procedures