SlideShare a Scribd company logo
Refer the attached docs to understand: Min 250 words
Select ONE of the following security incidents and provide the
following information:
1. A SQL Injection was performed by a hacker, resulting in the
loss of PII data.
2. You have discovered a covert leak (exfiltration) of sensitive
data to China.
3. Malcious code or malware was reported on multiple users'
systems.
4. Remote access for an internal user was compromised -
resulting in the loss of PII data.
5. Wireless access. You discovered an "evil twin" access point
that resulted in many of your users connecting to the hacker's
access point while working with sensitive data.
6. Compromised passwords. You discovered that an attacker
used rainbow tables to attack your domain's password file in an
offline attack. Assume that all of your user's passwords are
compromised.
7. A DoS or DDoS was performed against your system,
resulting in the loss of 3 hours of downtime and lost revenue.
Paragraph 1: IRT Team
. What would the IRT team look like for this incident (who
would be on the team to be able to effectively handle the
event)? Justify your choices.
Paragraph 2:
Approach. Address HOW you would respond. What logs or
tools would you use to identify/analyze the incident? What
would alert you to the incident? What tools would you use to
contain/recover from the incident?
Paragraph 3:
Metrics. Who would you measure your team's response
effectivenss? What measurements/metrics would you track?

More Related Content

Similar to Refer the attached docs to understand Min 250 wordsSelect O.docx

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptSilverGold16
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Securitysandra sukarieh
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databasessunil kumar
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfShivamSharma909
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksAll Things Open
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfSuzanne Simmons
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
why security is needed
why security is neededwhy security is needed
why security is neededsourov_das
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxhealdkathaleen
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docxmehek4
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 

Similar to Refer the attached docs to understand Min 250 wordsSelect O.docx (20)

Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Insider theft detection
Insider theft detection Insider theft detection
Insider theft detection
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
 
1 security goals
1   security goals1   security goals
1 security goals
 
why security is needed
why security is neededwhy security is needed
why security is needed
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 

More from lorent8

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxlorent8
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxlorent8
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxlorent8
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxlorent8
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxlorent8
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxlorent8
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxlorent8
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxlorent8
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxlorent8
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxlorent8
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxlorent8
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxlorent8
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxlorent8
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxlorent8
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxlorent8
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docxlorent8
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxlorent8
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxlorent8
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxlorent8
 
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxRefer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxlorent8
 

More from lorent8 (20)

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docx
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docx
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docx
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docx
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
 
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxRefer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
 

Recently uploaded

Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfDr. M. Kumaresan Hort.
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfYibeltalNibretu
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 

Recently uploaded (20)

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 

Refer the attached docs to understand Min 250 wordsSelect O.docx

  • 1. Refer the attached docs to understand: Min 250 words Select ONE of the following security incidents and provide the following information: 1. A SQL Injection was performed by a hacker, resulting in the loss of PII data. 2. You have discovered a covert leak (exfiltration) of sensitive data to China. 3. Malcious code or malware was reported on multiple users' systems. 4. Remote access for an internal user was compromised - resulting in the loss of PII data. 5. Wireless access. You discovered an "evil twin" access point that resulted in many of your users connecting to the hacker's access point while working with sensitive data. 6. Compromised passwords. You discovered that an attacker used rainbow tables to attack your domain's password file in an offline attack. Assume that all of your user's passwords are compromised. 7. A DoS or DDoS was performed against your system, resulting in the loss of 3 hours of downtime and lost revenue. Paragraph 1: IRT Team . What would the IRT team look like for this incident (who would be on the team to be able to effectively handle the event)? Justify your choices.
  • 2. Paragraph 2: Approach. Address HOW you would respond. What logs or tools would you use to identify/analyze the incident? What would alert you to the incident? What tools would you use to contain/recover from the incident? Paragraph 3: Metrics. Who would you measure your team's response effectivenss? What measurements/metrics would you track?