The organization must plan its incident response so

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: lan its incident response so the program can respond to security incident. They use a scenario analyses and brainstorming. ""tudents hac nto ic omputer sssttm ea t xupprt ei s ch no ool" The students found an nternet program that targets indowssbased networr s nad ere able to w discover the schooll passwordss ss s s a idGe s l nn vvnss a F mont Union Gigh chool Districtt re s strategic business and communittmanagerr o ch ool o fficia ls l ea rn ed o t f he b r each a n d fixed the ssstemm vulnn reabi itt s l t Gomeland ecuritt pDrtment's paonehe e sssttm hac ed This article is about a hac er wbo eroo anto h i telephone ssstem belonging to the Gomeland p ec ur i tt De a p rtm e nt r ac edup b out i ra n international callss Telecommunications securittadministrators now are able to configure securittsettings to avoid such incidentss These safeguards will protect customers' information from future hacking incidents. httpp p p www...
View Full Document

This note was uploaded on 06/30/2011 for the course BISM 3100 taught by Professor Geist during the Spring '08 term at Kennesaw.

Ask a homework question - tutors are online