Follow-up actions for making decisions

Assignment Help Basic Computer Science
Reference no: EM1361865

The Network Security Incident Response Team reports to you the Chief Information Security Officer (CISO). In real time there is an alert which indicates that a large, encrypted file is being downloaded to an external system by an unauthorized internal user. The internal user does not know the contents of the data because (its encrypted), but you (CISO) knows the user has access to very sensitive information. You have to decide immediately whether to stop the download in process, or continue to monitor and collect further evidence. What are the things you should consider in making this decision, and based on your choice, what would be your follow-up actions? [Obviously the answer can be taken in the context of a specific enterprise network (publicly known security breaches), and with knowledge of the kind of information the internal user has access to. You may respond either in general, in terms of a specific real world situation, or in terms of a fictitious situation, such as if it happened where you work.]

Reference no: EM1361865

Questions Cloud

Barriers to identifying problems in the market : Explain three barriers that might cause the marketing executive to poorly identify the problem(s). An illustrative example in this context should be included for each barrier.
Finding a flexibility test : Find a flexibility test (V sit-n-reach, modified sit-and-reach, back-saver sit and reach, or back scratch test) and write up a lab report regarding the test, and include an introduction, methodology, results and conclusion.
Non-egocentric mind : Explain the logic of the non-egocentric mind. What are attributes of this mind, and how does it usually think? Present ideas about how you can expand your ability to think rationally.
What was the car''s initial velocity : A charge of -3.95 nC and a charge of -5nC are separated by a distance of 30.0 cm. Find the position at which a third charge of +8.00 nC can be placed so that the net electrostatic force on it is zero. How many cm from the -3.95 nC charge and how m..
Follow-up actions for making decisions : What are the things you should consider in making this decision, and based on your choice, what would be your follow-up actions?
Roles in writing an exercise prescription : Discuss the following elements and their roles in writing an exercise prescription:
Detailing the cost : The buying department has found an excellent global positioning system circuit card in Germany that can provide your company with a competitive advantage in the marketplace.
How much work is done by a man in pushing the mower : A 0.2 object is swung in a vertical circular path on a string 0.1 m long. The acceleration of gravity is 9.8 m/s^2. If a constant speed of 4.07 m/s is maintained, what is hte tension in string when the object is at the top of the circle? Answer in..
Various components of fitness : During this stage of the course we have spent a considerable amount of time looking at the various components of fitness (strength, endurance, power, flexibility).

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Receiver initiated distributed scheduling algorithms

Receiver initiated distributed scheduling algorithms suppose task pre-emption at the sender site.

  What techniques have greatest impact on website

What web design techniques would you use to help a user with these disabilities? What techniques might have the greatest impact on your website and why?

  Determining z-transform and fourier transform

Consider the finite length sequencx(n)=D(n) + 0.5D (n-5). Determine z-transform and fourier transform of x(n). Determine N-point DFT of x(n) for N=50,10 and 5.

  Explaining why facebook-s design is different

Why is Facebook's design different? Or has Google merely perfected something that most organizations have just now started to "tackle"?

  Business environment impacted development telecommunication

Describe in scholarly detail how business environment has influenced development of telecommunications technology.

  Determine features and capacities of ram-disk storage

Determine the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will need for her site.

  Explaining cash-drawer management concept

Explain in scholarly detail cash-drawer management concept and its relationship to departmental Budget vs. Actual control process.

  Explaining smartphones as important digital devices

Many resources will suggest that in the next few coming years, smartphones will become the one of the most important digital devices we own. Explain the implications of this statement.

  Explaining constraint programming

It is about constraint programming. We have party organizations for being social. Every participant has their own preference list for parties, every party organizers has their own preference list for giving parties, too.

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Describe operating model for business process integration

Describe the chosen operating model in terms of business process integration. Compare the selected organization to the sample organizations using the chosen operating model in terms of business process integration.

  Application development and programming languages

Compare and contrast object-oriented languages (Java, C++, C#, etc.) to imperative languages (C, Pascal, etc.) in terms of: Programmability, Maintainability, Performance, Development tools

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd