logo

Audit Network And Security Assignment

   

Added on  2022-09-12

1 Pages466 Words16 Views
As per initial investigation, it
is identified that
organizational database has
been hacked and therefore,
severity of this data breach
is significant as it might have
provided hackers access to
student personal information
including payment
information as well
(Manworren, Letwat and
Daily 2016).
The severity level of a data
breach for the University
Increased awareness among
students for not sharing their
account password to anyone
(Brown 2016).
Access control needs to be
integrated with database for
restricting illegal access to
data (Gressin 2017).
Audit network security and
online activities of students
needs to be analyzed for
enhancing security and
privacy of data as well (Trim
and Lee 2019).
A plan for disaster recovery and
business continuity
In this incident response an
investigation team will be
designed for analyzing this
data breach in details to
identify its reasons and
providing mitigation
strategies as well (Cheng, Liu
and Yao 2017).
This investigation team will
contain database
administrator of university
database, advisor from the
national crime agency and
other team members of
information security team as
well.
The groups that are involved in
incident response
Once it is identified that
main database is hacked,
data will be redirected to
another redundant server
within 10 to 12 hours and
any online activities
involving to database will not
be allowed (Gressin 2017).
All network connections
within university will be
redirected to this new server
for ensuring data access.
Access to original data
server will be regained after
issues is resolved and this
will be done within2 to 3
days.
Measures to contain, recover and
prevent similar incidents
Information on data breach in University of
Innovation
References:
Brown, H.S., 2016. After the data breach:
Managing the crisis and mitigating the
impact. Journal of business continuity &
emergency planning, 9(4), pp.317-328.
Cheng, L., Liu, F. and Yao, D., 2017.
Enterprise data breach: causes, challenges,
prevention, and future directions. Wiley
Interdisciplinary Reviews: Data Mining and
Knowledge Discovery, 7(5), p.e1211.
Gressin, S., 2017. The equifax data breach:
What to do. Federal Trade Commission, 8.
Manworren, N., Letwat, J. and Daily, O.,
2016. Why you should care about the
Target data breach. Business Horizons,
59(3), pp.257-266.
Trim, P. and Lee, Y.I., 2019. Cyber security,
communication and risk management.
Sécurité & Stratégie, 32(April), pp.26-31.
Created by:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Yahoo Data Breach Case Assignment
|9
|3207
|30

Data Breach: List of Incidents, Australia’s Notifiable Data Breach, and GDPR Flowcharts
|12
|2782
|255

Presentation on Data Breach | Study
|1
|296
|20

Target Cyber Breach: Importance of Cyber Defences and Government Requirements
|8
|1850
|1

Data breach. Red Cross service suffers data breach. Int
|8
|474
|234

Data Breach of 21st Century
|15
|3719
|94