1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
9

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Computers and Technology
1 answer:
guapka [62]3 years ago
7 0

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

You might be interested in
Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundam
alukav5142 [94]

Answer:An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function.

Explanation:

8 0
2 years ago
The area that holds all the startup instructions the computer needs to start is the
Zigmanuir [339]
The area that holds all the startup instructions the computer needs to start is the ROM, or read-only memory. 
8 0
3 years ago
Is there any way to delete old questions on this? if there is no way, take this as a free question​
Lostsunrise [7]

Answer:

moderators have to delete it for u

Explanation:

8 0
3 years ago
Read 2 more answers
At the data science laboratory, the data scientists and data engineers are required to process millions of data every second to
defon

Answer:

the type of computer system that is required for processing of scientific data is : supercomputer

for distribution of data over a network :Client/server computing

working from home :A laptop

3 0
3 years ago
What is a logical reason why you should be able to delete your own posts on social media?
Furkat [3]

People live in the moment and post whatever they want and they just might regret it later on.

3 0
3 years ago
Read 2 more answers
Other questions:
  • As the driver it is not your responsibility that you are focused on the driving task with any possible distractions minimized. T
    9·2 answers
  • RDBMS stands for_________________
    12·1 answer
  • A model release can be either oral or written down. true or false
    13·2 answers
  • When you use the fill handle to copy a formula to adjacent cells, this creates what kind of cell reference?
    5·1 answer
  • Consider an environment in which there is a one-to-one mapping between user-level threads and kernel-level threads that allows o
    7·1 answer
  • A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
    10·1 answer
  • Write a program to calculate the great circle distance between two points on the surface of a sphere. If p1(x1, y1) and p2(x2,y2
    5·1 answer
  • How do you reflect yourself in the topic (filters)​
    14·1 answer
  • You need to know more than just facts in order to use critical thinking skills.
    5·1 answer
  • Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original stri
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!