Data Breach Report: Incident Response, Security, and Management

Verified

Added on  2022/08/25

|1
|296
|20
Report
AI Summary
This report delves into the critical aspects of data breaches, encompassing security measures, incident response, and risk assessment. The report outlines a structured approach to address data breaches, including the identification of vulnerabilities, implementation of security controls, and development of incident response plans. It covers the significance of business continuity planning, including identifying key business areas, assessing financial impacts of downtime, and formulating recovery strategies. Furthermore, the report underscores the importance of proactive security measures, such as establishing intrusion detection systems, creating incident response teams, and conducting penetration testing. The report also highlights the significance of compliance with national and international data protection laws and standards, as well as the incorporation of various security management techniques to mitigate risks and ensure data security. The report also includes the importance of creating a data breach recovery plan, and the report also includes the importance of learning from the mistakes to improve the security measures.
Document Page
DATA BREACH
At University of Innovation
Vulnerabilities
Exploitation of
vulnerability results in
comprise of infrastructure
devices or servers’ root-
level. Exploitation is
straightforward usually.
Attacker don’t have
authentication knowledge
or credentials of
individual victims. It is
advised that it is patched
or upgraded quickly.
Exploitation might result
in raised privileges. This
might result in significant
downtime or data loss.
Business
Continuity
PlanIdentify purview of plan
Label significant arenas of
business
Discover and traverse business
functionalities
Identify both internal as well as
external dependencies.
Calculate the downtime in
relevance of profitability and
business
Devise plan for getting system
running
References
Cheng, L., Liu, F. and
Yao, D., 2017.
Enterprise data breach:
causes, challenges,
prevention, and future
directions. Wiley
Interdisciplinary
Reviews: Data Mining
and Knowledge
Discovery, 7(5),
p.e1211.
Goode, S., Hoehle, H.,
Venkatesh, V. and
Brown, S.A., 2017. User
compensation as a data
breach recovery action:
An investigation of the
Sony Playstation
network breach. MIS
Quarterly, 41(3),
pp.703-727.
Solove, D.J. and Citron,
D.K., 2017. Risk and
anxiety: A theory of
data-breach harms. Tex.
L. Rev., 96, p.737.
Data breach Recovery
Plan
Isolate the impacted system
Get to source of problem
Communicate as well as
disclose
Remediate as well as focus
over recovery
Keep record of learned
lessons
Hire proactive service
provider
Security Measures
Prepare for security breach
Identify IT assets of system
Add Intrusion Detection
System
Create response plan of breach
Backup data
Penetration testing
Create Incident Response Team
(IRT)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[object Object]