1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
9

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Computers and Technology
1 answer:
guapka [62]3 years ago
7 0

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

You might be interested in
Joe, a user, has just installed his first home wireless router. Which of the following tasks should be considered to help secure
MakcuM [25]

Answer:

Update the unit firmware.

Explanation:

Updating unit firmware means update the information related to the network that is newly installed on the wireless router. The purpose of this change is to update the devices with new network alterations to work with efficiency and better security. As things are updating on daily basis, so the manufacturer makes the devices, reprogram able to meet the requirement of the future by updating the program in firmware unit. By updating device means this will be to fix the bugs that can be occur in modern era. This will make the device more secure.

5 0
3 years ago
What is the faster way for browsers to obtain the revocation status of a digital certificate attached to a Web site?
Lyrx [107]

Answer:

The fastest way to obtain the revocation status of digital certificate of the website is by using Online certificate Status Protocol (OSCP).

Explanation:

Online certificate status protocol is the protocol that help user to check and verify the digital certificate revocation status. This protocol is linked with the digital certificate issuance authority. Whenever someone want to verify the status of the digital certificate that is attached to access the website. The website administrator can send the request to OSCP handler to ensure the status of the certificate. The OSCP handler is connected through certificate issuance authority, send the detail to verify the status. After verifying the status, OSCP handler respond as certificate is valid or revoked to the concerned user.

5 0
3 years ago
What should you follow when creating a newsletter ?
kenny6666 [7]
You should follow a set of directions

6 0
3 years ago
Read 2 more answers
Jim has excellent oral and written communication skills. He enjoys public speaking and wants a job in which he will interact wit
fredd [130]
The best job for Jim would be public relations specialist.
7 0
3 years ago
Read 2 more answers
ENG103 DISCUSSION BOARD 6
amm1812
The proper citation for your course of study -computer related- is APA (American Psychological Association)  format. This citation format allows us to state the publication date, title , and authors in an organized and short fashion. All scholarly reports that are technology or psychology based, should be cited in APA format. 

<span>I know this because it is the format I use for all of my college courses which are all Computer/Technology related. </span>
3 0
3 years ago
Other questions:
  • You can drag a cell to a new location by pointing to the cell border until the pointer displays a _______ arrow, and then draggi
    9·2 answers
  • Are u a chicken nugget!!??
    14·2 answers
  • You are the network administrator for a school system. Your boss informs you that she is thinking of implementing a BYOD program
    15·2 answers
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • How do I logout of Brainly on mobile? When I went to settings, it had the option to log out but it was grayed out.
    14·1 answer
  • What is an Apple Pen?
    5·2 answers
  • Which professionals can benefit from an understanding of statistics? Check all of the boxes that apply. magician trying to locat
    5·2 answers
  • Hardware is found outside the system unit.​
    13·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • A small square at the right corner of the table is what?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!