Module 1 During the holiday break, your technicians detect ransomware in several databases. The ransomware has encrypted all of the data in the data bases and made your application unusable. Access to the impacted files can only be gained by paying the ransom or by restoring from the backup. At this point no one has contacted your organization requesting a ransom.
28
Made with FlippingBook - Online catalogs