6
.docx
keyboard_arrow_up
School
Butler University *
*We aren’t endorsed by this school
Course
4SU2023
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
2
Uploaded by ElderStingrayMaster51
6.9 Lab Report: Post-Incident Executive Summary
You need to create a post-incident executive summary report that addresses a security breach. Include an overview of actions taken at each phase of the incident response. Also include suggestions for corrective modifications that would prevent the incident from reoccurring.
Here is an example of an executive summary report for a cyber incident:
Executive Summary:
1.
Incident Summary
On November 16, 2023, our organization experienced a cyber incident that resulted in unauthorized access to our customer database. The incident was discovered by our security team at 10:00 AM EST.
2.
Research Summary
Our security team conducted a thorough investigation of the incident. The investigation revealed that the attacker gained access to our network through a phishing email that was sent to one of our employees. The email contained a malicious attachment that, when opened, installed malware on the employee’s computer. The malware then allowed the attacker to gain access to our network.
3.
Corrective Options
After the incident was discovered, our security team identified several corrective options that could have been taken to prevent the incident. These options included:
Providing additional security awareness training to employees to help them identify and avoid phishing emails.
Implementing multi-factor authentication to prevent unauthorized access to our network.
Conducting regular vulnerability assessments to identify and remediate security weaknesses in our network.
4.
Corrective Actions
Our security team took the following corrective actions to prevent this type of occurrence in the future:
All employees received additional security awareness training to help them identify and avoid phishing emails.
Multi-factor authentication was implemented for all accounts that have access to our network.
Regular vulnerability assessments are now conducted to identify and remediate security weaknesses in our network.
We believe that these actions will significantly reduce the risk of a similar incident occurring in the future.
Please note that this is just an example and should be tailored to your specific needs.
Reference:
1.
Kost, E. (2023). How to write the executive Summary of a Cybersecurity Report. Blog. Cybersecurity. https://www.upguard.com
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help