In: Computer Science
Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for which you have been employed as a database administrator for the past nine years. You leave a message on the office phone of your superior, John Dalton, the CIO of SuperMart.
SuperMart is a medium-sized retail company that evolved from a grocery chain in the 1980s. While the corporation has 200 stores, primarily in your region of the country, it carries a full line of grocery and household items in large outlets that are linked by a very up-to-date computer network with real-time integration of data into a series of databases. Your department has been working on a project that will be transferring all data into a data warehouse and streamlining data mining operations. Security for the system is handled by a security department for physical security, an IT security division of the network administration department, and by the team of data security and privacy specialists within your own data management department.
Even in these early moments of this possible breach of security, after your shock wears off, you understand that the CIO's response will be to meet immediately with all security personnel, with the database administrator, the network manager, the corporate legal team, and possibly the CEO and CFO. You have assigned your assistant to get as much information as possible from authorities, and you are making initial notes on a plan to proceed with SuperMart's response to such a potentially toxic data breach.
Using the scenario above research and discuss the 3 topics below.
Solution 1: Few tools that would help the database admin to actually prevent and even respond to the data breaches that are instigated on their computer systems are:
Solution 2: There are many strategies that can be carried out in order to secure a critical information system asset within an organization against any possible cyberattacks and some of them are described down below:
Solution 3: There are a lot of rules that are actually a lot of rules and regulations these days which actually make sure that the perpetrators of the cybercrime would be prosecuted in case of any such incident. Almost each and every country has a different set of rules and regulations that are passed by their legislation to secure the IT assets of that organization. The organization can even hire a cyber forensic team that can investigate the whole incident to find out who are the instigators so that they can be prosecuted.
Here's the solution to your question and it is absolutely correct, please please please provide it a 100% rating. Thanks for asking and happy learning!!