Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

This proverb couldnt be more precise in expressing the growing sentiment among cybersecurity practitioners. While theres still an opportunity for improvement, the vast majority of

This proverb couldnt be more precise in expressing the growing sentiment among cybersecurity practitioners. While theres still an opportunity for improvement, the vast majority of practitioners recognize the need and importance of cross-functional collaboration and sharing.This sentiment is primarily due to the realization that you can fight cyberattacks more effectively and efficiently by working collectively. Moreover, when one organization experiences a cyberattack, other organizations in the same industry often experience similar behavior. Additionally, by sharing and studying information on attacks, you begin to discover patterns and develop threat actor profiles that help you better strategize your defenses.For this activity, youll choose a particular industry and analyze the cybersecurity incidents that it has experienced.Take a look at the Privacy Rights Clearinghouse Links to an external site.. Explore the database and select "View by Category." Choose an industry by selecting one under the "Choose Organization Type" column. From there, select one under the "Choose Breach Type" column and analyze the rest of the details. You may have to do additional research on particular incidents to answer some of the questions below.Answer the following questions in your write-up about your chosen industry:What are the common sources of incidents for your industry, or how do they usually happen?a. Examples: internally sourced (e.g., deliberate data theft), externally sourced (e.g., malware)How does the industry typically learn about the incident (on their own or from an external party)?How long is the usual timeframe from the initial compromise to the organization first learning about it?How long is the typical incident timeline from incident detection to response and recovery?How is the quality and timeliness of the breach notification?How often are the perpetrators of the attack identified or prosecuted? What is the usual motive of the attack (e.g., financial gain, political, intellectual theft)?How severe is the typical impact of the incident? Are there any regulatory or industry fines? What protection is offered to customers?How would you rate your chosen industry's readiness to respond to incidents?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions