M01 - Part 1- Cengage Module 1 Case Project

docx

School

Ivy Tech Community College, Indianapolis *

*We aren’t endorsed by this school

Course

132

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by bobbymaf2020

Report
The category that best fits the situation described in the opening scenario is unauthorized access. There is evidence of someone attempting to gain access to HAL's credentialing services platform without permission, and the threat is coming from within the company. HAL's response, including the incident response plan and the involvement of a network operations expert, indicates that they have contingency planning in place. In terms of ethical decision-making, JJ should not take matters into his own hands or initiate the event review process without authorization. It is important to follow established procedures for incident response to ensure the incident is handled appropriately, evidence is protected, and legal and regulatory requirements are met. JJ's role is to report the potential security incident to the appropriate authorities, such as Paul and the response team. Paul, as the authority overseeing security, is responsible for determining the appropriate response and authorizing the event review process. Taking unauthorized action could compromise the investigation and lead to disciplinary consequences. In conclusion, it is crucial to follow established procedures for incident response to minimize the impact of security incidents and protect evidence. JJ should report the incident to the appropriate authorities and allow them to handle the situation according to the established procedures.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help