Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . Regularly back up data offline; segment networks; determine impacted systems; power down equipment; triage affected systems; examine logs; investigate and find the threat;

1.Regularly back up data offline; segment networks; determine impacted systems; power down equipment; triage affected systems; examine logs; investigate and find the threat; determine if negotiation needed or if system recovery is available.
2 Encrypt sensitive data; conduct regular security audits; promptly notify affected individuals; secure physical areas potentially related to the breach; mobilize the response team; remove improperly posted information; preserve evidence; work with forensic experts to fix vulnerabilities.
3.Educate users; use email filters; protect accounts using multi-factor authentication to prevent unauthorized access; implement anti-spooking controls to stop email addresses being a resource for attackers.
4. Vet third-party vendors and assess their security practices; determine the extent of the compromise on workflow using forensic analysis and restoring normal operations; adapt security and risk management procedures to monitor attack exposure; establish incident response protocols.
5. Identify the attack; deploy traffic filtering solutions; migrate to a new IP address; change the security architecture, processes, or tools; enable additional protections such as boosting firewalls or adding layers of protection.
6. Employ strong endpoint protection; patch and harden servers; use software composition analysis (SCA) tools; monitor system performance; block malicious mining scripts; educate users about safe browsing habits.
7. Educate employees about legal and ethical boundaries; use technology to monitor trading activities; utilize compliance programs; limit access to confidential information; enforce penalties.
8. Diversity investments; stay informed about market trends; add bonds; keep a long-term focus; consult financial advisors.
9. Conduct a rapid damage assessment; identify response team tasks; provide personal protective equipment; implement search and rescue; provide medical care; inspect and condemn damaged infrastructure; implement emergency restoration of essential services; implement emergency communications; provide provisions of emergency shelter for victims; debris removal.
10. Have in place a communications plan to communicate between organizational and jurisdictional partners; activate Emergency Operations Center (EOC) to support the incident area; assign fire and EMS representatives to the EOC to assist with coordination; establish a unified command with law enforcement and other agencies; ensure command post security; identify hot, warm, and cold zones; maintain and communicate situational awareness across all response teams; activate incident management team to organize and coordinate activities.
match A-j for each crisis event
A. Ransomware Attack
B. Denial-of-service (Dos) Attack
C. Insider Trading
D. Natural Disaster (hurricane, flood, earthquake)
E. Data Breach
F. Supply Chain Attack
G. Phishing Attack
H. Stock Market Crash
I. Civil Unrest /Riots
J. Cryptojacking

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data Fundamentals Concepts, Drivers & Techniques

Authors: Thomas Erl, Wajid Khattak, Paul Buhler

1st Edition

0134291204, 9780134291208

More Books

Students also viewed these Databases questions

Question

=+Why were they effective? How could you continue the campaign?

Answered: 1 week ago

Question

=+Who's your primary audience?

Answered: 1 week ago

Question

=+What do they need to hear?

Answered: 1 week ago