Incident response workflow for handling sensitive information leaks /

The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Mohd Azlan Mohd Nor (مؤلف)
التنسيق: أطروحة
اللغة:English
منشور في: Kuala Lumpur : 2020
الموضوعات:
الوصول للمادة أونلاين:http://studentrepo.iium.edu.my/handle/123456789/9858
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
الوصف
الملخص:The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of workflow process is unable to mitigate and contain the sensitive information leaks incident. Arrangement of activities in workflow process is important to facilitate the whole incident response process. Incident handler who are working with incident handling facilitates incident response to accomplish incident workflow process objective. This study explored the perspective of incident handler about the workflow to handle sensitive information leaks incident. Data were collected through incident scenario exercise. The data were analyzed with techniques that include categories, subcategories and summary from incident scenario response. The incident handlers revealed that incident workflow being used in organization has different objective to accomplish incident response. Some of limitation identified include detection and escalation processes of incident in workflow. The result suggested that a new workflow process need to be established as a gatekeeper to coordinate the whole investigation and mitigation process. These improvements of workflow have the implication of detection and escalation process. Several recommendations are given on how to handle sensitive information leaks associated with the present incident workflows. The findings of this study are expected to strengthen the procedure in organization while handling sensitive information leaks incident.
وصف المادة:Abstracts in English and Arabic.
"A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management." --On title page.
وصف مادي:xii, 49 leaves : illustrations ; 30cm.
بيبلوغرافيا:Includes bibliographical references (leaves 45-47).