Identify a cybersecurity breach.
Identification should include
- definition of breach as unauthorized access to an organization’s network
- types of breaches
- Social Security number (SSN)
- credit card numbers
- passwords
- fake accounts
- key loggers (i.e., type of system and data that was breached)
- indicators of a breach
- system performance
- an unusually high degree of activity
- mysterious mouse movements or keystrokes.
Process/Skill Questions:
Thinking
- What are the consequences of an information breach?
- How can information breaches be avoided?
- What follow-up measures are necessary when there has been an information breach?
- How can individuals and organizations mitigate further damage from an information breach?
Communication
- What communication methods can be used to minimize the possibility of an information breach?
- Why is the timeliness of communicating cybersecurity breaches important?
Leadership
- How can leadership influence a company’s rebound from a breach?
- What leadership strategies are effective in minimizing the damage caused by a cybersecurity breach?
Management
- How does decision-making affect the outcome of a cybersecurity breach?
- What are some consequences of not addressing a breach in a timely manner?