Identify a cybersecurity breach.

Identification should include

  • definition of breach as unauthorized access to an organization’s network
  • types of breaches
    • Social Security number (SSN)
    • credit card numbers
    • passwords
    • fake accounts
    • key loggers (i.e., type of system and data that was breached)
  • indicators of a breach
    • system performance
    • an unusually high degree of activity
    • mysterious mouse movements or keystrokes.

Process/Skill Questions:

Thinking

  • What are the consequences of an information breach?
  • How can information breaches be avoided?
  • What follow-up measures are necessary when there has been an information breach?
  • How can individuals and organizations mitigate further damage from an information breach?

Communication

  • What communication methods can be used to minimize the possibility of an information breach?
  • Why is the timeliness of communicating cybersecurity breaches important?

Leadership

  • How can leadership influence a company’s rebound from a breach?
  • What leadership strategies are effective in minimizing the damage caused by a cybersecurity breach?

Management

  • How does decision-making affect the outcome of a cybersecurity breach?
  • What are some consequences of not addressing a breach in a timely manner?