Impact
At this point, we’ve reached the last stage of the attack: impact. This is where threat actors achieve their goals and get what they want. Financial theft, data encryption, manipulation or destruction, resource hijacking, DoS – these are all direct consequences of incidents. Part of responding to such incidents is assessing the damage that’s been caused. This usually includes various qualitative and quantitative indicators related to the value of the data or systems, the scope of the attack, and the resources required for recovery. However, some consequences are not so easy to assess. These include, for example, reputational damage, financial loss, and legal implications.
To effectively respond to incidents, it is necessary to not only be able to assess direct damage but also to be prepared to assess indirect risks. You must also have an action plan at hand so that you don’t lose valuable time and can calculate the possibilities of minimizing the...