logo

Semantic Data Breach

   

Added on  2022-12-19

9 Pages2369 Words32 Views
 | 
 | 
 | 
Running head: SEMANTIC DATA BREACH
SEMANTIC DATA BREACH
Name of the student:
Name of the university:
Author Note:
Semantic Data Breach_1

SEMANTIC DATA BREACH1
Abstract
This report aims to highlight the potential factors directly held accountable for the security
breach and then depicts the possible mitigating methodologies for overcoming the loopholes and
attainment of the business targets of the organization.
Semantic Data Breach_2

SEMANTIC DATA BREACH2
Table of Contents
Introduction...........................................................................................................................................2
Discussion.............................................................................................................................................2
1. Real-world Case study...............................................................................................................2
1.1 Company Background Info................................................................................................3
1.2 The breach.........................................................................................................................3
1.3 Severity of the damage.......................................................................................................3
2. Breakdown of Breach Causes....................................................................................................4
2.1 Lack of support from Management....................................................................................4
2.2 Insufficient resources.........................................................................................................5
2.3 Lack of communication.....................................................................................................5
3. Prioritizing the Critical Security Controls..................................................................................5
3.1 Knock out the easy ones....................................................................................................5
3.2 Penetration Tests................................................................................................................6
Conclusion.............................................................................................................................................6
Bibliography..........................................................................................................................................7
Semantic Data Breach_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Symantec Breach in June 2019
|3
|1966
|90

Cyber Security Threats and Information Governance
|16
|4128
|21

Assignment on Internet Security
|10
|2633
|51

cyber security threats and attacks
|4
|749
|141

Target Cyber Breach: Importance of Cyber Defences and Government Requirements
|8
|1850
|1

Cyber Risk Issues for the Charitable Operation
|6
|1100
|15