Learner Name Asadbek Abdusattorov Learner Registration No


Download 172.66 Kb.
bet4/7
Sana15.06.2023
Hajmi172.66 Kb.
#1486626
1   2   3   4   5   6   7
Bog'liq
Asadbek Abdusattorov Cyber Security EI1-01



Part 2

Evaluation of the impact a cyber-attack has to the organisation.


In case of a successful cyber assault, your company may suffer severe losses. It has the potential to damage your bottom line, brand reputation, and customer confidence.
There are three main types of damage caused by security breaches: financial, reputational, and legal.
Cybercrime's High Price Tag
A significant amount of money may be lost due to cyber assaults because:
Information theft in the workplace
Data theft involving money
example, (bank details or payment card details)
Investing chaos caused by money theft
example (inability to carry out transactions online)
The end of a contract or commercial deal

Examining how much damage a cyberattack does to a company.


Damage to an organization's finances, reputation, and security of private data are only some of the possible outcomes of a cyberattack.
A data breach may cost an organization an average of $3.86 million, according to research by Verizon (2021). To paraphrase what the research showed, one would say: "The average cost of a data breach was determined to be $3.86 million (Verizon, 2021)."
A cyber assault may have serious consequences for a company beyond the monetary loss. According to a cyber-attack may drastically impair the public's impression of a company, resulting in a loss of trust and perhaps a loss of consumers. This principle might be expressed in a sentence like this one: "A cyber-attack can damage a company's reputation, which could result in a drop in trust and business" (Schneier, 2015).

Description of the content of an organisational incident management plan


A company's incident management plan details the steps that should be taken in the event of an incident, as well as the methods that will be used to keep things running smoothly thereafter.
The following elements, according to experts, are necessary for a successful incident management strategy:
Protocols for handling and relaying information during the first stage of an incident. In the case of an incident, this section should detail what needs to be done, including who to notify, who is accountable for what, and how teams and stakeholders may effectively communicate with one another.
(NIST, 2020).
Level 2 Incident Handling Protocols If the event cannot be controlled or handled at the first response level, the next actions must be outlined below, including who must be contacted and how the response will be escalated.
As an example of how this may be expressed in context, consider the following from NIST (2020): "The incident management plan should include processes for incident escalation, including measures to be taken if the event cannot be controlled or addressed at the first response level."
Methods for Reporting and Analysing Incidents 3 Debriefing, learning, and reporting on the incident to stakeholders are all post-resolution activities that should be included here (NIST, 2020).


Download 172.66 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling