logo

Presentation on Data Breach | Study

   

Added on  2022-08-25

1 Pages296 Words20 ViewsType: 20
 | 
 | 
 | 
DATA BREACH
At University of Innovation
Vulnerabilities
Exploitation of
vulnerability results in
comprise of infrastructure
devices or servers’ root-
level. Exploitation is
straightforward usually.
Attacker don’t have
authentication knowledge
or credentials of
individual victims. It is
advised that it is patched
or upgraded quickly.
Exploitation might result
in raised privileges. This
might result in significant
downtime or data loss.
Business
Continuity
PlanIdentify purview of plan
Label significant arenas of
business
Discover and traverse business
functionalities
Identify both internal as well as
external dependencies.
Calculate the downtime in
relevance of profitability and
business
Devise plan for getting system
running
References
Cheng, L., Liu, F. and
Yao, D., 2017.
Enterprise data breach:
causes, challenges,
prevention, and future
directions. Wiley
Interdisciplinary
Reviews: Data Mining
and Knowledge
Discovery, 7(5),
p.e1211.
Goode, S., Hoehle, H.,
Venkatesh, V. and
Brown, S.A., 2017. User
compensation as a data
breach recovery action:
An investigation of the
Sony Playstation
network breach. MIS
Quarterly, 41(3),
pp.703-727.
Solove, D.J. and Citron,
D.K., 2017. Risk and
anxiety: A theory of
data-breach harms. Tex.
L. Rev., 96, p.737.
Data breach Recovery
Plan
Isolate the impacted system
Get to source of problem
Communicate as well as
disclose
Remediate as well as focus
over recovery
Keep record of learned
lessons
Hire proactive service
provider
Security Measures
Prepare for security breach
Identify IT assets of system
Add Intrusion Detection
System
Create response plan of breach
Backup data
Penetration testing
Create Incident Response Team
(IRT)
Presentation on Data Breach | Study_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Audit Network And Security Assignment
|1
|466
|16

Outline for a Security Program Management Tabletop
|9
|669
|25

Network Security: Incident Response, Business Continuity, Data Breach, and Encryption
|13
|3399
|368

Summary of Attack | Computer and Network Security
|7
|1353
|29

Disaster. R. ecovery Plan For Private Match. Introducti
|1
|284
|54

Investigation into Cyber-Security Countermeasures
|11
|2527
|237