This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

INCIDENT MANAGEMENT

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

 

Incident management

Institution

Name of student

Date of submission

Steps to solve this problem

 

  1. Find and correct the root of the problem.

When a data breach has happened, the cause of the issue should be tracked. To ensure that the password will not be violated in the future, the issue should be corrected.

  1. Perform an audit for cybersecurity

Comprehensively analyze the issue and take stock of the details you have and where it’s gone. Through this, one, both now and in the future, will respond better.

  1. Perform management of damages

Before it becomes public, one should get ahead of the issue and solve it as early as possible before the information is breached

  1. Refocus and Retrain

 

To ensure that such a thing is not going to happen again, check the cybersecurity protocols. Efficient steps should be placed in place to protect passwords and prevent data breaches.

Incident scenarios questions page 52

Question one

The crime is considered to be an incident. The type of incident committed to the scenario is a computer security incident. The workflow of the computers was triggered and, therefore, policy violation. It made the crashing and packed flood with unauthorized system privileges. This kind of incident should be taken to execute since the data have leaked through the emails given.

Question two

This type of incident can be prevented by rationale keeping the number of incidents low for a better business process. The computer security incident in question one should be limited and put measures on for better progress. The more computer security incidents occur in an organization, the more the number of incidents will rise. An organization should identify the incidents and have a key role risk assessment on incidents occurring which companies are unaware of.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide. NIST Special Publication800(61), 1-147.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask