Save
IT
Unit 3 - mine
Case Study
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Sophie _Xx
Visit profile
Cards (50)
What is the purpose of analyzing risk in a company?
To identify vulnerable
assets
View source
What should the review include when analyzing risk?
Identification
of
assets
,
procedures
, policies, and
vulnerabilities
View source
How can a company prepare for potential cyber incidents?
By running through
scenarios
before they happen
View source
What measures can improve a company's cyber security?
Implementing
controls
and measures
Operational
considerations for introducing them
View source
What is one way to reduce the impact of cyber security incidents?
Transfer workload onto
unaffected
servers
View source
What should customer management do during a cyber incident?
Explain the incident and consider
compensation
View source
How does quick recovery from a cyber incident benefit Triangle Widgets?
It minimizes downtime and ensures
business continuity
View source
What is a potential impact on customers during a cyber incident?
Data exposure
but not critical information
View source
How can proactive measures help maintain customer loyalty?
By reassuring customers through
compensations
and security upgrades
View source
How does categorizing incidents help the cyber team?
It allocates time needed to recover and
resources
View source
What are the categories of cyber security incidents?
Critical:
Lives
could be lost
Significant
: Severe loss of reputation
Minor
: Inconvenience
Negligible
: Little to no impact
View source
What is a risk of incorrectly categorizing incidents?
It can lead to inappropriate
responses
View source
How can employees be trained to handle cyber incidents?
By training them on specific
categories
of incidents
View source
What are the impacts of cyber security incidents on employees?
Inconvenience during incidents
Adapting to
policy changes
Increased security measures
View source
What is the importance of communication during a cyber incident?
To provide clear updates to
customers
View source
What must companies report to the ICO after a data breach?
If
personal data
has been modified, stolen, or lost
View source
What is a potential global impact of a data breach?
It can affect businesses in multiple
countries
View source
How can hackers gain access to sensitive information?
Through
emails
and organizational data
View source
What are operational considerations for training employees?
New
hardware/software
training
Video tutorials for
different roles
Checking understanding through
questions
View source
What are the benefits of updating policies?
Ensures
employees
are aware of changes
Improves risk
analysis
Maintains version control
View source
Why is a structured framework important for incident management?
It helps
employees
understand their roles
View source
What skills are important for team members communicating with affected individuals?
Compassion
,
empathy
, and
listening skills
View source
What can lead to employee burnout during incident management?
High volume
of tasks due to
formalized processes
View source
What is required for data breach notifications according to the DPA?
Notifications must be
timely
and thorough
View source
Why is careful planning important for incident response processes?
To stay
relevant
and efficient
View source
What is the first step in analyzing risk for Triangle Widgets?
Identify all
assets
,
procedures
, and
vulnerabilities
View source
Why should Triangle Widgets run through scenarios before incidents occur?
To prepare the company for
potential
incidents
View source
What measures can Triangle Widgets implement to improve cyber security?
Identify vulnerable
assets
Implement
controls
and procedures
Train employees on cyber security
Regularly review and update policies
View source
What is one way to reduce the impact of cyber security incidents?
Transfer workload to
unaffected
servers
View source
How can customer management help during a cyber security incident?
By explaining the incident and considering
compensation
View source
What is the cost consideration for Triangle Widgets when hiring cyber experts?
They must weigh
repair costs
against benefits
View source
How does quick recovery from incidents benefit Triangle Widgets?
It
minimizes
downtime and ensures
continuity
View source
What can reduce the impact of data protection acts during a cyber incident?
Moving
sensitive data
to
separate servers
View source
What is a potential impact on customers during a cyber security incident?
Data exposure but not
critical information
View source
How can proactive measures help maintain customer loyalty?
By reassuring customers through
swift actions
View source
What is the purpose of categorizing cyber security incidents?
To allocate
recovery time
and resources effectively
View source
What is a consequence of incorrectly categorizing incidents?
Inappropriate responses to
threats
View source
How can training employees on incident categories improve security culture?
It promotes understanding of
threats
and responses
View source
What is a potential downside of having too broad categories for incidents?
They might fail to differentiate between incidents
View source
What is the impact of cyber security incidents on employees?
Inconvenience
and adapting to policy changes
View source
See all 50 cards