Reactive services usually consist in post incident reports from constituency or other events related to threats or attacks such as compromised hosts, malware, vulnerabilities or other type of similar incidents.

Examples of such services are:

  • Alerts & Warnings
  • Incident handling
  • Vulnerability handling
  • Artifact handling

The services that fall under this category usually refer to post mortem analysis of an security incident. Alerting the constituency about the incident and providing technical support for solving the problem is a core task of a CSIRT. Technical support can be in the form of system forensics, malware analysis, root cause analysis, incident mitigation.

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more