How should you proceed if your network forensic investigation involves other companies?
What will be an ideal response?
ANSWER: As with all investigations, keep preservation of evidence in mind. Your investigation might turn up other companies that have been compromised. In much the same way you wouldn’t turn over proprietary company information to become public record, you shouldn’t reveal information discovered about other companies. In these situations, the best course of action is to contact the companies and enlist their aid in tracking down network intruders. Depending on the situation, at some point you might have to report the incident to federal authorities.
You might also like to view...
The ________ function returns the number of cells in a cell range that contain numbers
Fill in the blank(s) with correct word
Your company has recently completed the connection of its network to a national high-speed private cloud network. Local businesses in the area are seeking to connect to the high-speed cloud network by directly connecting through your company's network. Your company's Chief Information Officer (CIO) believes that this is an opportunity to increase revenues and visibility for the company. However,
the Chief Security Officer (CSO) has expressed concerns regarding the security issues such a proposition introduces. As the security analysis, you have been asked to document the technical security requirements of the connection. Which document are you creating? A. NDA B. OLA C. ISA D. SLA