See also
Go to:
Identification
Detection
Recovery
Go back to the Bacula Enterprise Security and Threat Analysis chapter.