This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: confidentiality and availability loss to the hospital and to the patients. c. List and explain two non-technical attacks that can be used to compromise confidentiality of information held by Minor. Task 3 [12 marks]: Contingency Planning (4+8=12 marks) 1. List and describe four different reasons for financial institutions to have a business continuity plan (BCP). Financial loss Customer loss Lecture 30ish 2. Suppose you are the Information Security Officer (CISO) of Fortune Inc. Suppose successful penetration or denial of service attacks with significant impact on operations; significant risk of negative financial or public relations impact has been detected and reported to you. As the CISO, explain the steps you will perform to respond and manage the incident. Incident real? Yes? How severe? Can we handle it or not? Low or high? Low can we stop it? N recovery High disaster plan and then disaster recovery plan Lecture week 3 slide 29ish...
View Full Document
This note was uploaded on 09/25/2010 for the course SIT 284 taught by Professor Lei during the Three '08 term at Deakin.
- Three '08