Answered step by step
Verified Expert Solution
Question
1 Approved Answer
This proverb couldnt be more precise in expressing the growing sentiment among cybersecurity practitioners. While theres still an opportunity for improvement, the vast majority of
This proverb couldnt be more precise in expressing the growing sentiment among cybersecurity practitioners. While theres still an opportunity for improvement, the vast majority of practitioners recognize the need and importance of crossfunctional collaboration and sharing.This sentiment is primarily due to the realization that you can fight cyberattacks more effectively and efficiently by working collectively. Moreover, when one organization experiences a cyberattack, other organizations in the same industry often experience similar behavior. Additionally, by sharing and studying information on attacks, you begin to discover patterns and develop threat actor profiles that help you better strategize your defenses.For this activity, youll choose a particular industry and analyze the cybersecurity incidents that it has experienced.Take a look at the Privacy Rights Clearinghouse Links to an external site.. Explore the database and select "View by Category." Choose an industry by selecting one under the "Choose Organization Type" column. From there, select one under the "Choose Breach Type" column and analyze the rest of the details. You may have to do additional research on particular incidents to answer some of the questions below.Answer the following questions in your writeup about your chosen industry:What are the common sources of incidents for your industry, or how do they usually happen?a Examples: internally sourced eg deliberate data theft externally sourced eg malwareHow does the industry typically learn about the incident on their own or from an external partyHow long is the usual timeframe from the initial compromise to the organization first learning about itHow long is the typical incident timeline from incident detection to response and recovery?How is the quality and timeliness of the breach notification?How often are the perpetrators of the attack identified or prosecuted? What is the usual motive of the attack eg financial gain, political, intellectual theftHow severe is the typical impact of the incident? Are there any regulatory or industry fines? What protection is offered to customers?How would you rate your chosen industry's readiness to respond to incidents?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started