Incident management
Institution
Name of student
Date of submission
Steps to solve this problem
- Find and correct the root of the problem.
When a data breach has happened, the cause of the issue should be tracked. To ensure that the password will not be violated in the future, the issue should be corrected.
- Perform an audit for cybersecurity
Comprehensively analyze the issue and take stock of the details you have and where it’s gone. Through this, one, both now and in the future, will respond better.
- Perform management of damages
Before it becomes public, one should get ahead of the issue and solve it as early as possible before the information is breached
- Refocus and Retrain
To ensure that such a thing is not going to happen again, check the cybersecurity protocols. Efficient steps should be placed in place to protect passwords and prevent data breaches.
Incident scenarios questions page 52
Question one
The crime is considered to be an incident. The type of incident committed to the scenario is a computer security incident. The workflow of the computers was triggered and, therefore, policy violation. It made the crashing and packed flood with unauthorized system privileges. This kind of incident should be taken to execute since the data have leaked through the emails given.
Question two
This type of incident can be prevented by rationale keeping the number of incidents low for a better business process. The computer security incident in question one should be limited and put measures on for better progress. The more computer security incidents occur in an organization, the more the number of incidents will rise. An organization should identify the incidents and have a key role risk assessment on incidents occurring which companies are unaware of.
References
Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide. NIST Special Publication, 800(61), 1-147.