According to the Federal Trade Commission (FTC), what are reasonable measures to provide data security protecting both trade secrets and customer data?

As a group, generate and evaluate reasons why people may not appreciate the cultural point of view of others.
August 5, 2017
Discuss how prison architecture has evolved over the history of corrections.
August 5, 2017
Show all

According to the Federal Trade Commission (FTC), what are reasonable measures to provide data security protecting both trade secrets and customer data?

CASE STUDY:

  • Read Chapter 2 – Case Study
  • Read Chapter 3 – Spotlight #1.

In no more than two pages, answer the following questions:

  • According to the Federal Trade Commission (FTC), what are reasonable measures to provide data security protecting both trade secrets and customer data?
  • What recommendations would you have for Wilmington University for protecting student data?
  • What are the BC/DR best practices for any organization?
  • What recommendations would you have for Wilmington University Library?Th

The textbook link is

http://www.flood.rmutt.ac.th/wp-content/uploads/filebase/Related%20articles%20and%20writings/Related%20articles%20and%20writings%20(Eng)/Disaster%20Management%20Eng/Business%20Continuity%20and%20Disaster%20Recovery%20Planning%20for%20IT%20Professionals.pdf

Excerise:

Please read and review the following article and video:

Watch Video

2014 Cyber Security Session 24 – Cyber Security Incident Response

Duration: (39:46)




User: n/a – 
Added: 10/11/14

Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, think about the following Lockheed-Martin’s Cyber Kill Chain:

  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control (C2)
  • Actions on Objectives

Your assignment is as follows:

  1. Define and discuss the three steps to Cyber Security Incident Response.
  2. Research recent cyber breaches and discuss the cyber “kill” chain for one of the breaches.
  3. For the company involved in step 2, make at least three (3) recommendations to senior leadership that could avoid breaches in the future.

Feel free to use the Cyber Threat Intelligence and Incident Response Report template for your assignment.

Leave a Reply

Your email address will not be published. Required fields are marked *