The vulnerability assessment and risk management group, you test and verify the integrity of standalone workstations and network servers.
The network intrusion detection and incident response group responds by locating the user and blocking his or her access.
The computer investigations group manages investigations and conducts forensic analysis of systems suspected of containing evidence related to an incident or a crime.