?You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?
What will be an ideal response?
?First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.
You might also like to view...
When preparing to upload an ASP database to the server using the dialog box in the accompanying figure, make sure that the ____ ends with /Database/.
A. root directory B. password C. login D. FTP host
The business impact analysis (BIA) is the first major component of the CP process.
Answer the following statement true (T) or false (F)