- Home >
- Computer Science >
- Data Leakages and Countermeasures
Data Leakages and Countermeasures
Question Description
Data Leakages and Countermeasures
In this Application, you identify data leakages and necessary countermeasures to close security gaps as part of an incident response. You also prepare some of the investigation reports for the business sector you chose as part of your Group Project.
Consider
this scenario: An employee within your business's human resources
department noted that when she came to work this morning, the front door
of the department area was open, and several of the computers were
turned on. Standard practice for this department, which handles
sensitive employee information and organizational data, is to lock its
doors and turn off its computers at night. At this point, no one is sure
if a security breach has taken place, but these computers provide
access to personal and private data, and everyone wants to know whether a
breach has occurred. As the person responsible for forensic
investigations in your organization, your job is to determine what has
happened and to document your findings. You must document your findings
and present them at a preliminary investigation meeting (PIM).
Compose a unique incident and investigation review document to
address the incident described above. Include a brief (1–2 paragraphs)
executive summary of the report and a detailed incident and
investigation review. For your review, follow the instructions in the
"Forensics Plan Guide," Sections 1.1–1.9 (pages 5–7 of the document).
Use the template provided in the guide following the index (copy and
paste or recreate the template in a word processor) and fill in the
required information for each of the following sections:
- 1.1 Determine the intent and scope of the investigation
- 1.2 Determine legal restrictions
- 1.3 Determine the limits of the investigator's authority
- 1.4 Determine what the client wants from the investigation
- 1.5 Determine resource availability
- 1.6 Determine the escalation procedures
- 1.7 Determine liaison and reporting requirements
- 1.8 Document known facts and initial incident time-line
- 1.9 Determine facts of the incident
This question has not been answered.
Create a free account to get help with this and any other question!
Similar Content
A Separate Peace
by John Knowles
The Magic Mountain
by Thomas Mann
Slaughterhouse Five
by Kurt Vonnegut
Where the Crawdads Sing
by Delia Owens
Gone with the Wind
by Margaret Mitchell
Alice in Wonderland
by Lewis Carroll
Fools Crow
by James Welch
50 Shades of Grey
by E. L. James
Underground A Human History of the Worlds Beneath our Feet
by Will Hunt
Studypool values your privacy. Only questions posted as Public are visible on our website.
Brown University
1271 Tutors
California Institute of Technology
2131 Tutors
Carnegie Mellon University
982 Tutors
Columbia University
1256 Tutors
Dartmouth University
2113 Tutors
Emory University
2279 Tutors
Harvard University
599 Tutors
Massachusetts Institute of Technology
2319 Tutors
New York University
1645 Tutors
Notre Dam University
1911 Tutors
Oklahoma University
2122 Tutors
Pennsylvania State University
932 Tutors
Princeton University
1211 Tutors
Stanford University
983 Tutors
University of California
1282 Tutors
Oxford University
123 Tutors
Yale University
2325 Tutors