logo

Application of Risk Mitigation and Planning Tools

   

Added on  2023-03-23

3 Pages830 Words42 Views
 | 
 | 
 | 
Application of Risk mitigation and planning tools
The intrusion to the Epsilon email address database:
On 30th march 2011 Epsilon was hit by one of the most costly data breaches, where the data of their
client’s customers was exposed by malicious attackers. The attackers intruded into the email database
and obtain the information of the customers such as their names and email addresses. To avoid such
type of attacks in future Epsilon should appoint Computer Incident Response Team (CIRT), to respond
towards such security risk to the company and its clients in future. In addition to dealing with specific
security risk they should appoint a team of experts to guide organization with appropriate
communication during such incidents (Prince)
Tsunami in Northeastern Japan
To prevent and mitigate the risk of occurrence of Tsunami in future it is important to prepare a Disaster
Recovery Plan (DRP). A DRP can help to know how nations can be prepared for the disasters, how they
can respond to the disasters so that there is minimum loss of the property and human lives and how can
industries resume their working after the disasters in a degraded operating environment.
Disruption of Amazon Cloud Servers
During debugging of an issue in the billing system a member of S# team accidentally made a typing
mistake and large number of servers was removed from the cloud than intended. The server that was
removed also supported other two S3 subsystem. This led down with them many big services such as
Quora, Trello and others. Fortunately the company has Business Continuity Plan in place that helped in
lessening the impact of this disruption. The BCP of the company had operational details on the steps
that has to be taken during and after the occurrence of this disruption (AWS).
Hacking into SONY databases
The hackers said they gained access to Sony's networks from inside Sony. The hackers introduced
malware into the databases and stole and removed important data from there. Sony should have in
place appropriate Business Continuity and Disaster Recovery plans to emerge from these attacks (Bort).
Physical Intrusion of SEALS into Pakistan hideout
Computer Incident Response Team.
Con Ed brownouts over this coming summer months
During brownouts, water is warm, incandescent lights are dimmer and electric equipment moves
slower, such as elevator, lifts, motors and so on. Business continuity plans BCP should be in place during
this brownouts to avoid disruption in the various functions in organizations.
Application of Risk Mitigation and Planning Tools_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

What Is Business Continuity and Why Is It Important?
|10
|1590
|14

IT Security Management Program for a Shipping Agency Database
|13
|1987
|279

Design and Implementation of Security Policy
|5
|645
|67

Signs of a Network Data Breach & How to Prevent One
|6
|1682
|13

Data Structure and Algorithms Report 2022
|11
|2178
|7