SlideShare a Scribd company logo
1 of 2
Refer the attached docs to understand: Min 250 words
Select ONE of the following security incidents and provide the
following information:
1. A SQL Injection was performed by a hacker, resulting in the
loss of PII data.
2. You have discovered a covert leak (exfiltration) of sensitive
data to China.
3. Malcious code or malware was reported on multiple users'
systems.
4. Remote access for an internal user was compromised -
resulting in the loss of PII data.
5. Wireless access. You discovered an "evil twin" access point
that resulted in many of your users connecting to the hacker's
access point while working with sensitive data.
6. Compromised passwords. You discovered that an attacker
used rainbow tables to attack your domain's password file in an
offline attack. Assume that all of your user's passwords are
compromised.
7. A DoS or DDoS was performed against your system,
resulting in the loss of 3 hours of downtime and lost revenue.
Paragraph 1: IRT Team
. What would the IRT team look like for this incident (who
would be on the team to be able to effectively handle the
event)? Justify your choices.
Paragraph 2:
Approach. Address HOW you would respond. What logs or
tools would you use to identify/analyze the incident? What
would alert you to the incident? What tools would you use to
contain/recover from the incident?
Paragraph 3:
Metrics. Who would you measure your team's response
effectivenss? What measurements/metrics would you track?

More Related Content

Similar to Refer the attached docs to understand Min 250 wordsSelect O.docx

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptSilverGold16
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Securitysandra sukarieh
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksAll Things Open
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfSuzanne Simmons
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
why security is needed
why security is neededwhy security is needed
why security is neededsourov_das
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docxmehek4
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 

Similar to Refer the attached docs to understand Min 250 wordsSelect O.docx (20)

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Insider theft detection
Insider theft detection Insider theft detection
Insider theft detection
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
 
1 security goals
1   security goals1   security goals
1 security goals
 
why security is needed
why security is neededwhy security is needed
why security is needed
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 

More from lorent8

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxlorent8
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxlorent8
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxlorent8
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxlorent8
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxlorent8
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxlorent8
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxlorent8
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxlorent8
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxlorent8
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxlorent8
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxlorent8
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxlorent8
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxlorent8
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxlorent8
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxlorent8
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docxlorent8
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxlorent8
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxlorent8
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxlorent8
 
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxRefer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxlorent8
 

More from lorent8 (20)

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docx
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docx
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docx
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docx
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
 
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxRefer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
 

Recently uploaded

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 

Recently uploaded (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 

Refer the attached docs to understand Min 250 wordsSelect O.docx

  • 1. Refer the attached docs to understand: Min 250 words Select ONE of the following security incidents and provide the following information: 1. A SQL Injection was performed by a hacker, resulting in the loss of PII data. 2. You have discovered a covert leak (exfiltration) of sensitive data to China. 3. Malcious code or malware was reported on multiple users' systems. 4. Remote access for an internal user was compromised - resulting in the loss of PII data. 5. Wireless access. You discovered an "evil twin" access point that resulted in many of your users connecting to the hacker's access point while working with sensitive data. 6. Compromised passwords. You discovered that an attacker used rainbow tables to attack your domain's password file in an offline attack. Assume that all of your user's passwords are compromised. 7. A DoS or DDoS was performed against your system, resulting in the loss of 3 hours of downtime and lost revenue. Paragraph 1: IRT Team . What would the IRT team look like for this incident (who would be on the team to be able to effectively handle the event)? Justify your choices.
  • 2. Paragraph 2: Approach. Address HOW you would respond. What logs or tools would you use to identify/analyze the incident? What would alert you to the incident? What tools would you use to contain/recover from the incident? Paragraph 3: Metrics. Who would you measure your team's response effectivenss? What measurements/metrics would you track?