What do you do if you are faced with any of the following;
Web page defacement
Hospital patient databases maliciously altered
Engineering design databases maliciously altered
Trade secret theft
Stolen corporate marketing plans
Computer network used as a jump-off point to attack other networks
Computer-controlled building environmental controls maliciously modified
Stolen corporate bid and proposal information
Military weapons systems altered
Satellite communication system takeover
Here is the manual for dealing with it.
Need a technical guide? Many more like this, plus ebooks on many subjects, audiobooks and music related items at MakeGreatMusic.net.