?You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?

What will be an ideal response?

?First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.

Computer Science & Information Technology

You might also like to view...

When preparing to upload an ASP database to the server using the dialog box in the accompanying figure, make sure that the ____ ends with /Database/.

A. root directory B. password C. login D. FTP host

Computer Science & Information Technology

The business impact analysis (BIA) is the first major component of the CP process.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology