Free Essay SamplesAbout UsContact Us Order Now

Threat detection and response

0 / 5. 0

Words: 275

Pages: 1

86

Data Breach Response Plan
Name:
Course:
Tutor:
Institution:
Location:
Date:
Data Breach Response Plan
Data breach response plan is a document that consists of procedures to curb or protect illegal access to individual’s personal details by disclosing, editing misusing or destroying.
Below is a data breach response plan created to respond to the breach of private data of university disabled student.
Identification and protection of sensitive data
This will be done by classifying and handling data which require high privacy. Disaster recovery is a suitable scheme to document the data in order to classify it.
Determine the condition of the institutional IT system and establish areas of risk.
This is performed by examining technology domains processes and individuals involved.
Liaising with employees working in the IT office is another potential strategy, they are more likely to be aware of any vulnerability.
Initiating a process to discourage unintentional mistakes
Introducing an elaborate process which ensures no breach occurs in case of any venerability (Salido and Voon, 2010, 35). If the cyber pros harden, the cyber a defined process should be undertaken to verify its configuration.
Plan a fragmented defense mechanism
Security controls are employed at every level of the system (Boynton and Greenhalgh, 2004, 1312). Training the employees to watch on social engineering invasions is highly recommended.
Support the response team
This plan will save time for a response since it reduces formalities such as approval and authority are given by the vertical staff.

Wait! Threat detection and response paper is just an example!

Testing the plan and addressing the gaps
During testing, confirmation will be done on the plan to ensure it conforms to laws of the regulatory body.
Create a communication scheme
The IT officer will work with governmental and human resource departments to make a sound decision on how to notify the breach to employees within the institution, the public and the victims of the data breach.
Establish outside and inside relationships.
The IT department will establish a relationship with potential entities like law enforcers, public relation companies and forensic firms (Stallman, 2010, 252). By doing so, it becomes convenient to evaluate and select the can meet the needs of the institution.
Reference List
Boynton, P.M. and Greenhalgh, T., 2004. A hands-on guide to questionnaire research: Selecting, designing, and developing your questionnaire. BMJ: British Medical Journal, 328(7451), p.1312.
Salido, J. and Voon, P., 2010. A Guide to Data Governance for Privacy, Confidentiality, and Compliance. Microsoft Trust. Compute. p.35.
Stallman, H.M., 2010. Psychological distress in university students: A comparison with general population data. Australian Psychologist, 45(4), pp.249-257.

Get quality help now

Top Writer

John Findlay

5,0 (548 reviews)

Recent reviews about this Writer

I’ve been ordering from StudyZoomer since I started college, and it is time to write my thankful review. You’ll never regret using this company!

View profile

Related Essays

Sunjata the Archetypal Hero

Pages: 1

(275 words)

Case Study Drug Addiction

Pages: 1

(275 words)

Play Therapy

Pages: 1

(275 words)

Cyberattack Brief

Pages: 1

(275 words)

Liberalism versus Sociolism

Pages: 1

(275 words)

History Islam Text 3

Pages: 1

(275 words)

History Islam Text 2

Pages: 1

(275 words)