Review the attached articles about a cyber incident. Imagine that you were assigned to the incident response
Question:
Review the attached articles about a cyber incident. Imagine that you were assigned to the incident response team to investigate this incident on behalf of the company or organization.
Explain, in excruciating detail, what systems you will image. Once you've done those images, describe what you're going to look for in the system images. Where, EXACTLY, do you look for evidence of how this malware got on to the systems and what data was manipulated?
Finally, consider what data your company has on those systems. Explain what confidential data you might find on these systems. Describe how you would decide how to deal with the fact that this confidential data was on a system that was compromised by this malware.
- Opioid Treatment Center Behavioral Health Group Suffers CyberattackLinks to an external site., Cyber Jack, Dec 15, 2021
- Opioid addiction network stalls under cyberattackLinks to an external site., By Dr. Tim Sandle, Published December 15, 2021
- Cyberattack on BHG opioid treatment network disrupts patient careLinks to an external site., By Lawrence Abrams, December 14, 2021 10:35 AM
Foundations of Finance The Logic and Practice of Financial Management
ISBN: 978-0132994873
8th edition
Authors: Arthur J. Keown, John D. Martin, J. William Petty