CYBERSECURITY PROCESS
4D-R2 Philosophy / D.4 DESTROY
Detailed information of an incident to authorized personnel to obtain further instructions to potentially.
D.4
Destroy (you are here)
Internal/External Threat(s).

Perform
Red/Black Team
Collect Intelligence
e-Discovery
Communication to Leadership
Report/Terminate Threat
Threat/Attacker Base of Operations
Locations
Headquarters
Satellite Offices/Additional Branch locations
Homes (Telecommuter)
Nation State
Networks
Physical
Wireless
Remote Access
Virtual Private Network (VPN)
Servers
Physical
Cloud (AWS/IBM/AZURE)
Additional Assets
ISP
IT Equipment
Bank Account Data
Geolocation/Position
Identity/Associations
Military Data/Equipment
Additional Individual Data
Electronic Devices