Analyze the security incident and provide specific examples and details from the case study to support your risk assessment.

Cyberattacks

Many organizations marginalize the management of the security of their infrastructure in hopes that they will not be the target of cyberattacks. However, cyberattacks happen frequently and tend to become more sophisticated over time. In reality, every organization is a likely target of malicious actors. These attacks result in a range of impacts on an organization and its core business and could significantly interrupt operations.

To be proactive, organizations need to have structures, processes, and plans in place to counter and respond to potential attacks and to deal with the consequences of successful attacks. A suitable security management plan and well-defined security goals that support the overall goals of the organization can ensure a reasonable level of business continuity, even in the case of security incidents.

In any organization, the individuals on the IT staff must work together to support the security goals of the organization. These individuals play significant roles in detecting and preventing security incidents before they occur. In the case of successful attacks, security management professionals are tasked with acting quickly to mitigate the attack’s efects.

In this assessment, refer to the attached “Case Study,” which contains details regarding a security incident at a small non-governmental organization (NGO).

In part one of this task, analyze the security incident and provide specific examples and details from the case study to support your risk assessment.

In part two, create a plan to efectively address the aftermath of the incident and manage the NGO’s ongoing security risks.

Analyze the security incident and provide specific examples and details from the case study to support your risk assessment.
Scroll to top