Examine the data breach

Assignment Help Computer Network Security
Reference no: EM133468974

Assignment:

Examine the following data breach scenario at your organization:

Your organization has - I am sorry to say - had a data breach. You know this because your CFO received a visit from the police indicating the breach occurred. You are a new employee in the Compliance Department of your organization, and you discover that your cybersecurity standards reference "instituting and executing the incident response plan." However, when you ask, you are told that there isn't a written incident response plan.

Please make recommendations for how you would go about developing a plan, while in the middle of an actual breach. As a point of clarity, no incident response plan is necessary. Rather, explain how you would go about building a plan, while simultaneously pursuing a breach response. Be sure to address both of the following questions:

  • How do you know if what you're doing is reasonable? Are you doing everything you need to?
  • How do you take the lessons learned in the current incident, as a way to make a better plan for the next breach?

Reference no: EM133468974

Questions Cloud

How a+ certification will advantageously position : Envision yourself professionally networking with someone who is extremely short on time but needs to understand what you're doing and where you want to go.
What is meant by dea drug classification schedule : What is meant by the DEA Drug Classification Schedule? Explain each category/classification.
Why does salary transparency make for a better workplace : Why does salary transparency make for a better workplace for the employee and for the organization
Previous neurological concerns : As the nurse obtains a client history, she notes that the client has not had any previous neurological concerns.
Examine the data breach : Your organization has - I am sorry to say - had a data breach. You know this because your CFO received a visit from the police indicating the breach occurred.
Why are police not given total freedom to help stop crime : Why are the police not given total freedom to help stop crime? Why are they not allowed to use evidence that clearly establishes a person's guilt, no matter
Entire platoon for failure of an individual : Why are the Marines so unfair as to punish an entire platoon for the failure of an individual ?
Demonstrate both to prove that your instrument works : demonstrate both to prove that your instrument works and describe what construct validity is; instead, explain how you'll prove your test demonstrates construct
Evaluate two of the organizations current weaknesses : Evaluate two of organization's strengths. Evaluate two of the organization's current weaknesses. Evaluate two of the organization's current unmet opportunities.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the importance of endpoint security

What is the importance of endpoint security? Why is endpoint security important to reduce down time? How can endpoint security help preserve user data?

  Analyze overall manner in which poor cybersecurity policy

Analyze the overall manner in which poor cybersecurity policy can disrupt business continuity. Provide at least two examples of such disruption to support your response.

  What are possible security threats that have a direct effect

What are the possible security threats that have direct effect on companys network performance? How will network optimization solutions benefit an organization?

  Show that the isbn code can detect an error

Show that the ISBN code can detect an error that is either a transposition of two digits or a numerical error in a single digit.

  Discuss fisma and its relevance to cybersecurity

Discuss FISMA and its relevance to cybersecurity. Define the terms below and describe the environment in which each access control model works best.

  What are the main elements of a unix syslog facility

What are the main elements of a UNIX syslog facility? Explain how an interposable library can be used for application-level auditing.

  Implementing the hipaa security and privacy rules

How does the United States enforce the HIPAA regulation or identify if an organization is implementing the HIPAA security and privacy rules?

  Create a network diagram of a network

Create a network diagram of a network and / or in a data flow where your real-world example would exist using a diagramming application.

  Understanding on network-related issues

CISC650 Computer Networks - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest.

  What kinds of things do you think the administrator will see

A network administrator views the output from the "show ip route" command. What kinds of things do you think the administrator will see on the output?

  Tools and techniques used to impact web applications

Tools and techniques used to impact web applications. What are some of the motivations behind these attacks

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd