0% found this document useful (0 votes)
65 views2 pages

Security Breach Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 2

I would suggest to tackle such situations we should try to have stricter monitoring.

All employees

working in the IT department with access to any kind of sensitive information, that would benefit

anyone outside the firm, should be monitored and their data access log should be kept to see what

kind of files they’re accessing and if at all the files they’re accessing are relevant or necessary to

the task/job they’re doing. This would definitely be an effective strategy because when an

employee knows every move they make is being tracked, their steps will be cautious and if at all

they try to make a curious move, they should be flagged immediately so that the others in the

security department can take the necessary steps to stop it. This will benefit the firm in the long

run. It is quite necessary to formulate a crystal clear method of incident response so as to secure

and minimize the harm that could be caused by computer threats. It also helps in distinctively

evaluating and avoiding the risks involved in the threats.

When it comes to tackling the events related to computer threats, the security crew experiences

numerous crazy procedures. Therefore, it is quite expected that the security crew might not be able

to implement distinctive procedures for effectively eliminating the unavoidable threats. Hence, it

is essential for the incident response team to focus on the critical circumstances to be tackled

spontaneously. An intelligent and a future oriented incident response method can play a major role

in avoiding unexpected harm to the reputation of a business unit.

It is very important to formulate and create a program to establish a suitable strategy at the earliest.

An extensive incident response approach could be of a great importance for a security crew in

order to implement a fully effective and an immediate response to the threats involved.

The alleviation of risk may be described as a set of moves like taking risk, avoiding risk, restricting

risk and transferring risk etc, that can be helpful in controlling the bad consequences whatsoever.
Moreover, it is necessary to create a defined method that can meet all the requirements of an

organization.

Risk Limitation: One of the standard and significant strategies for managing risks is risk limitation.

This procedure involves equal percentages of risk avoidance and risk acceptance that controls the

vulnerability of an Organization. Hence, each and every organization avoids a debacle of any kind

by creating backups to avoid long term risks. Having said that, there are a few chances of an

organization accepting risks on the perspective of a disk drive that might not function as expected.

Reference

Rajagopal, A. (2019, June 17). Incident Of The Week: Investigation Of Walmart Email Breach.

Retrieved from https://www.cshub.com/attacks/articles/incident-of-the-week-

investigation-of-walmart-email-breach

You might also like