?You have been called in to collect information regarding a recent data breach at your organization. What specific information would you collect and for what reasons would you seek that information?

What will be an ideal response?


?First, I would identify what actions or inactions led to the data breach. This will help in reducing or preventing such attacks in future. Second, I would identify the vulnerabilities that were exploited in this attack so that those vulnerabilities can be addressed. Third, I would review the capabilities of the intrusion detection system and recommend updates, modifications, or replacement so that similar intrusions can be detected sooner.

Computer Science & Information Technology

You might also like to view...

Word provides a means of canceling your recent ____.

A. applications B. indices C. actions D. commands

Computer Science & Information Technology

The important design element that refers to the empty spaces on a Web page is known as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To view the Document Inspector dialog box, click the Check for Issues button, and then click ____.

A. Check Document B. Document Info C. Inspect Document D. Protect Document

Computer Science & Information Technology

Give an example of the interleavings of two transactions that is serially equivalent at each server but is not serially equivalent globally.

What will be an ideal response?

Computer Science & Information Technology