{"id":20,"date":"2024-07-27T10:30:55","date_gmt":"2024-07-27T05:30:55","guid":{"rendered":"https:\/\/csirt.tj\/?page_id=20"},"modified":"2024-07-27T15:17:33","modified_gmt":"2024-07-27T10:17:33","slug":"services","status":"publish","type":"page","link":"https:\/\/csirt.tj\/?page_id=20&lang=en","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"20\" class=\"elementor elementor-20\">\n\t\t\t\t<div class=\"elementor-element elementor-element-92ff19b e-flex e-con-boxed e-con e-parent\" data-id=\"92ff19b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05db63e elementor-widget elementor-widget-heading\" data-id=\"05db63e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42bd3173 e-flex e-con-boxed e-con e-parent\" data-id=\"42bd3173\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d434f47 elementor-widget elementor-widget-text-editor\" data-id=\"d434f47\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul style=\"font-weight: 400;\">\n<li>Determining if an event constitutes a security incident subject to investigation;<\/li>\n<li>Conducting an appropriate investigation into the root cause, source and nature of a computer security incident, assessing the extent of damage, and recommending an effective response;<\/li>\n<li>Coordinating efforts to preserve evidence of the incident;<\/li>\n<li>Interviewing affected users;\u00a0<\/li>\n<li>Managing the release of information to the user community;<\/li>\n<li>Preparing a report of findings, root causes, lessons learned, and recommended actions for management review.<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Services Determining if an event constitutes a security incident subject to investigation; Conducting an appropriate investigation into the root cause, source and nature of a computer security incident, assessing the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-20","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/pages\/20","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=20"}],"version-history":[{"count":8,"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":141,"href":"https:\/\/csirt.tj\/index.php?rest_route=\/wp\/v2\/pages\/20\/revisions\/141"}],"wp:attachment":[{"href":"https:\/\/csirt.tj\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}