Incident Examples

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
3 hours 39 minutes
Difficulty
Intermediate
CEU/CPE
4
Video Transcription
00:00
Mulele 3.19 incident examples
00:04
during this module will explore the types of incidents that may occur and analyze the different types of incidents. With examples
00:11
types of incidents
00:14
card
00:15
when cards used to transfer funds are compromised.
00:18
Hack When a criminal system intentionally compromises system and steals data.
00:22
Insider,
00:23
employer trusted individual takes information.
00:26
Los lost USB drives, mobile devices, papers or workstations,
00:31
accidental disclosure, unintentionally sharing sense of information
00:36
card incidents.
00:37
Skimming devices are rfid scanners or point of service terminals can all be used
00:43
to steal information from cards, Information taken from magnetic strip. A photo of a card is taken or malware transfers data from the transaction elsewhere.
00:54
Hack business software such as malware, ransomware used to take information, encrypt information or control information for various purposes
01:02
organized crime, rogue nations, Lone wolf or a hacker for hire could be responsible for these types of incidents.
01:10
Insider instance, deliberate unauthorized access theft or sabotage made by employees or subcontractors.
01:19
Lost instance, lost USB drives, laptops, mobile phones, workstations, data center equipment,
01:26
paper record boxes,
01:26
backup tapes, data files that cannot be restored for all examples
01:30
of loss incidents.
01:33
It's important to note that some regulations give you a pass in the event you have encryption on any of these types of devices, especially electronic devices.
01:42
But you may have to show your encryption, process your methodology and prove that the encryption keys are way to decrypt the information was not obtained or was not publicly available,
01:56
accidental disclosure incidents, including an unintended recipient of an email exposing confidential information on a screen or paper in public
02:05
sharing information verbally in public sharing a link to an unintended recipient. Acts of God, terrorism vendor. Air natural occurrences such as a fire
02:14
or special incidents which could be a meteor asteroid hitting your building. Hopefully a small one are examples of accident disclosures. These are things that you didn't plan. These are simply just accidents or things that were rare really didn't anticipate occurring. However,
02:30
they created an incident which could have potentially exposed. P. Or sense of information
02:38
quiz. Question
02:39
the file left at a restaurant that was later retrieved should be considered a breach to her false.
02:51
The answer is of course true.
02:53
The question remains though, how serious of a breach was it?
02:55
Was it a file
02:57
with non identifying information?
03:00
Or was it a file that had thousands of
03:04
instances of pe
03:06
well being a breach?
03:07
If it had P. I. It definitely would constitute as one. Even if it was one. However
03:13
the individual
03:15
or individuals if they are under a certain threshold may not have reported to regulatory authorities. Which is why it's so important to understand and work with council on what laws are impacted by the P. I. That was exposed
03:27
and what you need to do about it.
03:30
In this module, we discussed the different types of incidents
03:32
and reviewed each of the specific incident types with examples.
Up Next