Incident response workflow for handling sensitive information leaks /

The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of...

全面介紹

Saved in:
書目詳細資料
主要作者: Mohd Azlan Mohd Nor (Author)
格式: Thesis
語言:English
出版: Kuala Lumpur : 2020
主題:
在線閱讀:http://studentrepo.iium.edu.my/handle/123456789/9858
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
實物特徵
總結:The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of workflow process is unable to mitigate and contain the sensitive information leaks incident. Arrangement of activities in workflow process is important to facilitate the whole incident response process. Incident handler who are working with incident handling facilitates incident response to accomplish incident workflow process objective. This study explored the perspective of incident handler about the workflow to handle sensitive information leaks incident. Data were collected through incident scenario exercise. The data were analyzed with techniques that include categories, subcategories and summary from incident scenario response. The incident handlers revealed that incident workflow being used in organization has different objective to accomplish incident response. Some of limitation identified include detection and escalation processes of incident in workflow. The result suggested that a new workflow process need to be established as a gatekeeper to coordinate the whole investigation and mitigation process. These improvements of workflow have the implication of detection and escalation process. Several recommendations are given on how to handle sensitive information leaks associated with the present incident workflows. The findings of this study are expected to strengthen the procedure in organization while handling sensitive information leaks incident.
Item Description:Abstracts in English and Arabic.
"A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management." --On title page.
實物描述:xii, 49 leaves : illustrations ; 30cm.
參考書目:Includes bibliographical references (leaves 45-47).