Description
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

there are all the files buddy. Please take a look at them and give me a good review..I have attached an outline for your convenience tooGoodbye for now
Running head: INCIDENT EVALUATION
Incident Evaluation
Name
Course
Tutor
Date
INCIDENT EVALUATION
2
Incident Evaluation
Data Incident
ABC is a manufacturing company, located in Kentucky that is characterized by the production of
new technology and selling it online to customers as well as retailers directly. With the nature of
operations, the company requires a security system that can protect them from various incidents
that may arise from cyber-related risks (Von Solms, 2013). Therefore, for planning and security
purposes, the company uses a core transactional Enterprise Resource planning system known as
NEDS. Recently, NEDS, which is located in the Netherlands, underwent a burglary and lost a
number of equipment that may have had important data; laptops, hard drives, iPhones, and
blackberries. Upon this burglary, a notification was made to alert ABC of the occurrences.
However, the notification came 5 days after the incident since it was sent via a mailed letter. The
contents of the letter included a police report of the stolen items; the area of operation impacted,
and data that may have been compromised from the burglary. With the development of this
incident, there was a realization of an inadequate Incident Response Management and therefore
efforts of evaluating and improving old practices are underway. In this case, the data incident
lays out a high potential of risk since information of clients as well as projects of the company
are put at risk of being compromised. This is in regards to the confidentiality required with the
nature of the business that the company employs.
Data that could be impacted
Based on the areas and sectors hit by the burglary, there are a number of data that could be
compromised or affected. These include customer and retailer information from 2002-2014,
company information regarding sales strategies, and some financial information of the company.
INCIDENT EVALUATION
3
For the customer and retailer information, crucial documents such as credit card numbers and
bank account data are put at hand. With the privacy policy that the company thrives on, this
compromise of retailer and customer information violates the laws of the company. On the other
hand, since NED usually stores financial and sales data for the company, this is also an area that
could highly be compromised or impacted. In this case, the information on new sales tactics by
the company may be jeopardized. In addition to this, crucial data regarding ...
