Malware Identification Decision Tree |
6. Symantec Specific Analysis Steps |
![]() | 6.1. Identify the Threat and Attack Vectors |
![]() | 6.2. Identify the Infected Computers |
![]() | 6.3. Quarantine the Infected Computers |
![]() | 6.4. Clean the Computers Infected |
![]() | 6.5. Post-op Prevent Recurrence |
1. Suspect Worm |
2. Suspect Advanced Persistent Threat |
3. Incident Response Phases |
4. Suspect Virus |
5. Suspect Trojan |
7. Information References |
Source of some of this information: http://service1.symantec.com/support/ent-security.nsf/854fa02b4f5013678825731a007d06af/52f4f4d80ac9a7b2882576ac0067121c?OpenDocument