preview

Assignment 2: Information Security Breach

Satisfactory Essays
Open Document

Following the security breach that this corporation they had investigation into what happened in the security breach they need to find out who was involve in the breach . I need to also let the manage of the corporation know what was going on and what kind of plan I have come up with to deal with this. I have to determined if this breach is of the appropriate magnitude, if I need to share it with press or not . As the tech for the information system department at this corporation .I need to make sure that I will give notify the department in which the breach happened. I will provide a brief description of the security breach that happened. I also need to make sure that I compromised shall be notified in the most expedient time as possible …show more content…

Most of the companies will need to help of key vendors and security to make the firms to identify the cause of the breach. Following a breach notify your agent and claims representative as soon as possible. You also need to keep the lines of communication open . This is very important to make sure that you keep the employees, customers and business partners and all other that may be interested parties and you need to keep them up to date about what is happening that would the attack that you had. Sometime a company needs to start over after a breach has happened. You would also want to gather a IT staff to make sure that you would document the facts that surrounding the incident. You would want to check your security events logs to help you to know what vital is the time the date that the breach took place and you would also what was the machine to which was involved in the incident. You would also want to know if there was any personally identifiable information was take in this breach such as social security number or any medical records or financial information or any other confidential data was

Get Access