?You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?
What will be an ideal response?
?First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.
You might also like to view...
Word provides a means of canceling your recent ____.
A. applications B. indices C. actions D. commands
The important design element that refers to the empty spaces on a Web page is known as ____________________.
Fill in the blank(s) with the appropriate word(s).
To view the Document Inspector dialog box, click the Check for Issues button, and then click ____.
A. Check Document B. Document Info C. Inspect Document D. Protect Document
Give an example of the interleavings of two transactions that is serially equivalent at each server but is not serially equivalent globally.
What will be an ideal response?