1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
9

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Computers and Technology
1 answer:
guapka [62]3 years ago
7 0

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

You might be interested in
Which document would be best created using Word online
topjm [15]
Resume       
6 0
3 years ago
Read 2 more answers
When a percentage of the smallest and largest values are deleted from a data set, the mean of the remaining data values is the a
xz_007 [3.2K]

Answer:

Correct option C

Trimmed mean

Explanation:

A trimmed mean is a method of averaging that removes a small designated percentage of the largest and smallest values before calculating the mean.

Trimmed mean helps eliminate the influence of data points on the tails that may unfairly affect the traditional mean.

Trimmed means are used in reporting economic data in order to smooth the results and paint a more realistic picture.

5 0
3 years ago
The private field, which is known as the property‘s __________, holds any data that is assigned to the property.a. private datab.
Jobisdone [24]

Answer:

(b) backing field

Explanation:

A backing field of a property is a private field that stores or holds any data assigned to the property. Backing fields are generated for a class property if that property uses the default implementation of the accessor methods in that class.

Backing fields help to make codes readable, flexible and robust as they enhance encapsulation - one great feature in Object Oriented Programming.

7 0
3 years ago
Which elements are visible when a user opens a new PowerPoint presentation? Check all that apply.
ch4aika [34]

Answer:

- Title Text Placeholder

- Subtitle Text Placeholder

Explanation:

5 0
2 years ago
Pre-made, copyright-free illustrations are called ______.
djyliett [7]

Pre-made copyright free illustrations are called clip art. Clip art is used in many programs such as Microsoft and are easily available. The other answer choices do not represent copyright-free and previously made illustrations.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Collaborative filtering is
    10·1 answer
  • Software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage informa
    12·1 answer
  • What test is most similar to binary​
    9·1 answer
  • Aye yo, how do I get rid of an already placed end crystal? I thought it looked cool to build in my minecraft survival house, and
    10·2 answers
  • Susan is working with an IT company. She has been asked to make sure that all of the functions in the company are in place and p
    12·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • Write a program that computes the minimum, maximum, average and standard deviation of the population over time for a borough (en
    6·1 answer
  • When pointed over a text within a paragraph, the cursor takes the shape of a/an
    10·1 answer
  • the tool that is used on the form to display text that the user cannot change is a. textbox b. label c. button​
    9·1 answer
  • Edhesive Intro to CS: 3.4 Code Practice: Question 1, Input a word. If it is "yellow," print "Correct." Otherwise, print "Nope."
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!