Think about a situation in which hackers got access to information by installing malware on the POS systems of more than a million credit and debit card terminals across the world. The initial malicious code had been caught by the firewall, and an alarm had been sent, but it had been disregarded. The hackers began downloading the information that had been gathered. Cyber thieves have gained access to the system in order to steal credit and debit card information. Because of an excess of notifications from its network security equipment, the company acknowledged that they had disregarded many of the warnings. What would you do if you were the organization's Chief Technical Officer (CTO) in order to alleviate the issue of alert overstimulation?
Think about a situation in which hackers got access to information by installing malware on the POS systems of more than a million credit and debit card terminals across the world. The initial malicious code had been caught by the firewall, and an alarm had been sent, but it had been disregarded. The hackers began downloading the information that had been gathered. Cyber thieves have gained access to the system in order to steal credit and debit card information.
Because of an excess of notifications from its network security equipment, the company acknowledged that they had disregarded many of the warnings. What would you do if you were the organization's Chief Technical Officer (CTO) in order to alleviate the issue of alert overstimulation?
Step by step
Solved in 5 steps