1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
9

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Computers and Technology
1 answer:
guapka [62]3 years ago
7 0

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

You might be interested in
For a web application we associate a web server, for a mobile application we associate a mobile server. for a decentralized appl
Alex_Xolod [135]

For a decentralized software application we associate a blockchain server.

<h3>What is a server?</h3>

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

<h3>Types of server.</h3>

In Computer technology, there are different types of server and these include the following:

  • Web server
  • Email server
  • File server
  • Database server
  • Proxy server
  • Distributed communication server
  • Centralized Server
  • Distributed application server
  • Blockchain server

Generally, a web software application is associated with a web server, a mobile software application is associated with a mobile server, and a decentralized software application we associate a blockchain server.

Read more on web server here: brainly.com/question/27960093

#SPJ1

7 0
1 year ago
What is presentation
Gelneren [198K]
To present something infront of a crowd
5 0
3 years ago
Read 2 more answers
Simplify the expresion<br>12. 12g + 9g​
Lerok [7]
12g + 9g simplified is 21g
7 0
3 years ago
All of the following are helpful test taking strategies EXCEPT_______________.
guajiro [1.7K]
Complete The test as quickly as possible
6 0
3 years ago
Read 2 more answers
100 POINTS + BRAINLYEST TO FIRST PERSON THAT IS CORRECT!!! Which items can be found in the Properties section of the Backstage V
Lunna [17]

Print settings

author off document

how many times it has been viewed

4 0
3 years ago
Read 2 more answers
Other questions:
  • The Modified Greiss chemical test is used to detect the presence of what chemicals that indicate muzzle to target distance?
    11·1 answer
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • When you send an email to your professor, a server holds that email until the professor requests it.
    8·1 answer
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • What is a simulation?
    5·2 answers
  • In this exercise we will practice using loops to handle collections/containers. Your job is to write a program that asks the use
    6·1 answer
  • Difference between switch and switch lite
    10·1 answer
  • Which of the following can be termed ‘application software’?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!