Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Response Plans

Deepfake Incident (0-24 hours)

Hour 0-2: Contain

  1. Document everything
  2. Alert security team
  3. Preserve evidence

Hour 2-6: Assess

  1. Identify deepfake type
  2. Determine scope
  3. Assess damage

Hour 6-24: Respond

  1. Submit takedowns
  2. Contact platforms
  3. Issue statements

Prompt Injection Incident

Immediate (0-1 hour)

  1. Isolate systems
  2. Review logs
  3. Identify compromise

Short-term (1-24 hours)

  1. Patch vulnerabilities
  2. Reset credentials
  3. Notify users