Discuss some of the differences in tools, techniques, skills and personnel that are needed between an intrusion into a network environment and a response to a single computer that is not part of a network environment.

Discuss some of the differences in tools, techniques, skills and personnel that are needed between an intrusion into a network environment and a response to a single computer that is not part of a network environment.

Resources: