Security Breach Assignment
Security Breach Assignment
Security Breach Assignment
All employees
working in the IT department with access to any kind of sensitive information, that would benefit
anyone outside the firm, should be monitored and their data access log should be kept to see what
kind of files they’re accessing and if at all the files they’re accessing are relevant or necessary to
the task/job they’re doing. This would definitely be an effective strategy because when an
employee knows every move they make is being tracked, their steps will be cautious and if at all
they try to make a curious move, they should be flagged immediately so that the others in the
security department can take the necessary steps to stop it. This will benefit the firm in the long
run. It is quite necessary to formulate a crystal clear method of incident response so as to secure
and minimize the harm that could be caused by computer threats. It also helps in distinctively
When it comes to tackling the events related to computer threats, the security crew experiences
numerous crazy procedures. Therefore, it is quite expected that the security crew might not be able
to implement distinctive procedures for effectively eliminating the unavoidable threats. Hence, it
is essential for the incident response team to focus on the critical circumstances to be tackled
spontaneously. An intelligent and a future oriented incident response method can play a major role
It is very important to formulate and create a program to establish a suitable strategy at the earliest.
An extensive incident response approach could be of a great importance for a security crew in
order to implement a fully effective and an immediate response to the threats involved.
The alleviation of risk may be described as a set of moves like taking risk, avoiding risk, restricting
risk and transferring risk etc, that can be helpful in controlling the bad consequences whatsoever.
Moreover, it is necessary to create a defined method that can meet all the requirements of an
organization.
Risk Limitation: One of the standard and significant strategies for managing risks is risk limitation.
This procedure involves equal percentages of risk avoidance and risk acceptance that controls the
vulnerability of an Organization. Hence, each and every organization avoids a debacle of any kind
by creating backups to avoid long term risks. Having said that, there are a few chances of an
organization accepting risks on the perspective of a disk drive that might not function as expected.
Reference
Rajagopal, A. (2019, June 17). Incident Of The Week: Investigation Of Walmart Email Breach.
investigation-of-walmart-email-breach