Follow-up actions for making decisions

Assignment Help Basic Computer Science
Reference no: EM1361865

The Network Security Incident Response Team reports to you the Chief Information Security Officer (CISO). In real time there is an alert which indicates that a large, encrypted file is being downloaded to an external system by an unauthorized internal user. The internal user does not know the contents of the data because (its encrypted), but you (CISO) knows the user has access to very sensitive information. You have to decide immediately whether to stop the download in process, or continue to monitor and collect further evidence. What are the things you should consider in making this decision, and based on your choice, what would be your follow-up actions? [Obviously the answer can be taken in the context of a specific enterprise network (publicly known security breaches), and with knowledge of the kind of information the internal user has access to. You may respond either in general, in terms of a specific real world situation, or in terms of a fictitious situation, such as if it happened where you work.]

Reference no: EM1361865

Questions Cloud

Barriers to identifying problems in the market : Explain three barriers that might cause the marketing executive to poorly identify the problem(s). An illustrative example in this context should be included for each barrier.
Finding a flexibility test : Find a flexibility test (V sit-n-reach, modified sit-and-reach, back-saver sit and reach, or back scratch test) and write up a lab report regarding the test, and include an introduction, methodology, results and conclusion.
Non-egocentric mind : Explain the logic of the non-egocentric mind. What are attributes of this mind, and how does it usually think? Present ideas about how you can expand your ability to think rationally.
What was the car''s initial velocity : A charge of -3.95 nC and a charge of -5nC are separated by a distance of 30.0 cm. Find the position at which a third charge of +8.00 nC can be placed so that the net electrostatic force on it is zero. How many cm from the -3.95 nC charge and how m..
Follow-up actions for making decisions : What are the things you should consider in making this decision, and based on your choice, what would be your follow-up actions?
Roles in writing an exercise prescription : Discuss the following elements and their roles in writing an exercise prescription:
Detailing the cost : The buying department has found an excellent global positioning system circuit card in Germany that can provide your company with a competitive advantage in the marketplace.
How much work is done by a man in pushing the mower : A 0.2 object is swung in a vertical circular path on a string 0.1 m long. The acceleration of gravity is 9.8 m/s^2. If a constant speed of 4.07 m/s is maintained, what is hte tension in string when the object is at the top of the circle? Answer in..
Various components of fitness : During this stage of the course we have spent a considerable amount of time looking at the various components of fitness (strength, endurance, power, flexibility).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd