Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization - Research Paper Example

Comments (0) Cite this document
Summary
With this change, network communication has grown and improved allowing computers to communicate with each other easily from remote locations. This has added opportunities for illegal activities…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization
Read TextPreview

Extract of sample "Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization"

Download file to see previous pages So as to ensure the network security and security of information on the network, an organization has to have a response and investigation plan. There are many reasons as to why an organization should use a response and investigation plan. According to Vacca and Rudolph (2011), a response and investigation plan offers solutions to how hacking/intrusion attacks can be handled by the organization reducing damage and loss. This, however, builds confidence with the shareholders and helps cut losses that are as a result of hacking. With that in mind, this paper intends to provide a response and investigation plan for a large manufacturing Aspen Company with extensive intellectual property distributed across multiple locations in the United States and Latin America. There have been several recent small scale hacking/intrusion attacks that appear to be reconnaissance efforts for a larger scale attack. Reentry, the company faced an attack which affected its customer and shareholders data.
Hacking/intrusion attack is not an issue that is going to go away anytime soon. As the internet grows, and more users come online, hackers and introducers want to have access to personal data or organization’s confidential information (Anson, Bunting, Johnson & Pearson, 2012). This means that Aspen Company has to be able to detect any act of hacking/intrusion done in their systems. So as to do so, there has to be a forensic response and investigation plan. The forensic response and investigation plan described in this section documents the procedures Aspen Company followed after their hacking/intrusion attack. The forensic response and investigation plan will include; determining the nature of the attack and evidence handling and documentation.
Identifying the occurrence of hacking/intrusion attacks even if it is an IT-related issue cannot always be the sole obligation ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Forensically investigating a security breach while balancing the need Research Paper”, n.d.)
Forensically investigating a security breach while balancing the need Research Paper. Retrieved from https://studentshare.org/information-technology/1682801-forensically-investigating-a-security-breach-while-balancing-the-need-for-business-continuity-and-rapid-return-to-normalcy-within-the-organization
(Forensically Investigating a Security Breach While Balancing the Need Research Paper)
Forensically Investigating a Security Breach While Balancing the Need Research Paper. https://studentshare.org/information-technology/1682801-forensically-investigating-a-security-breach-while-balancing-the-need-for-business-continuity-and-rapid-return-to-normalcy-within-the-organization.
“Forensically Investigating a Security Breach While Balancing the Need Research Paper”, n.d. https://studentshare.org/information-technology/1682801-forensically-investigating-a-security-breach-while-balancing-the-need-for-business-continuity-and-rapid-return-to-normalcy-within-the-organization.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization

IPad's Security Breach

...with would be censored, in order to prevent them from threats and unauthorized access. Unfortunately, he was not able to protect the email addresses (Fpolom's blog). Gawker media was not guilty and was not socially responsible for the security breach that has happened. In addition, Gawker never asked from AT&T regarding their position from the impact of the breach (Fpolom's blog). 4 Factors a CEO should consider Current business trends are integrated to facilitate processes and functions via computing devices. Organizations maintain critical data on servers that are protected by efficient hardware based or software based security...
6 Pages(1500 words)Assignment

IPad's Security Breach

... has the capacity to facilitate individuals to steal highly confidential information from servers located in organization as well as stealing funds by credit cards and bank account, therefore, giving a major business loss to an organization. Hacking ethics are important for an organization to address. As Stephen Levy from the MIT department and Stanford, illustrated factors related to ethical hacking, which are as follows (Introduction to computer ethics n.d.): ‘Administrative accesses must be granted to every network resource, computing device and nodes. There will be no restrictions for accessing any kind of information from or within the network along with free of cost. There will be no ‘file access security’ framework and full... ...
5 Pages(1250 words)Assignment

IPad's Security Breach

...rather than benefiting their own organization by exposing the public information directly into their websites. 4. Based on this incident, determine what factors CEOs should consider when responding to a security breach. In the modern era of technological development information are stored in a distributed database system into the network which is accessed by the companies for their business process. Information stored can be very confidential for the business along with competitor information. Thus the security level is needed to be under full control and protected from any threat. Companies hire other companies to look...
5 Pages(1250 words)Coursework

IPad's Security Breach

...and Compliance will competently represent the organization. Legal counsel will also be solicited as need may be, regarding any complaints or actions against the firm. Conclusion AT&T, just like many other computer security firms, has experienced its fair share of security breaches by hackers. In June 2004, AT&T’s iPad was hacked into by website hackers from a security firm known as Goatse, which shared the hacked information with Gawker Media LLC. The increased cases of high-profile hacking has resulted in heated debates on the justification of hacking. Supporters of hacking argue that hacking helps in the detection of criminal...
4 Pages(1000 words)Essay

Social Media Usage, Over-Usage and Addictive Patterns

6 Pages(1500 words)Essay

IPad's Security Breach

...on the abilities of the organization and thus public need to be addressed in such cases. Responding to a security breach in a timely and efficient manner is responsibility to the CEO. In most cases, CEO is often ill-equipped to handle such crisis and often respond by shifting the blame or by taking no stand at all. As directed by the Australian government, the ideal CEO response consists of four steps. The first step is to assess the situation and minimize the impact of the security breach. Assessing the situation requires the creation of a crisis management team that will further guide the CEO in ways to minimize the impact. The second...
5 Pages(1250 words)Research Paper

Sony Playstation Security Breach

...developers and application developers must dance to the same tune. Sony PlayStation Network Security Breach Sony’s data center in San Diego, CA was hacked into on April 19, 2011. The hackers had gained access of customers’ data through Sony’s PlayStation Network servers. This attack on Sony is said to be the largest personal data heist in history with reports estimating that around 77 million Qriocity and PSN users’ accounts and 24.5 million Sony Online Entertainment user accounts were affected. (Better Business Bureau, 2011). Strange activities had been detected by Sony Corporation on their network system. They noticed unauthorized access of the company’s servers. A day after the...
8 Pages(2000 words)Essay

Representation of Crime in the Media

7 Pages(1750 words)Coursework

Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization

...A forensic investigative response approach for suspected security breach: Of late, wide scale cyber-attacks have buttressed that security and safety safeguards of ICT (information and communication technology) in many essential infrastructures are obviously not adequate as the aimed attacks perused by talented individuals or organizations. One can witness huge economic losses if there is attack on ICT systems used by the industries. For instance, the Stuxnet malware that eventually destabilized about 1000 numbers of enrichment of Uranium centrifuges in Natanz in Iran which is most famous reported illustration of ICT attack affecting ICS...
12 Pages(3000 words)Research Paper

Business Continuity Plan

...Project 4: Business Continuity Plan Project 4: Business Continuity Plan Plan Introduction Plan Purpose The primary aim of thisplan is to accord the White House security staff the necessary support concerning resources, intelligence and information. It is evident that such resources are critical when deterring any breach of security and potential emergency incidents that may disrupt normal white house business. Examples of such incidents include cyber-attack, natural calamities, hostile situations and intruder invasion. Plan Objective The plan to be formulated and implemented is expected to provide White...
4 Pages(1000 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Forensically investigating a security breach while balancing the need for business continuity and rapid return to normalcy within the organization for FREE!

Contact Us