Incident response workflow for handling sensitive information leaks /

The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd Azlan Mohd Nor (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : 2020
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/9858
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The sensitive information as corporate asset is valuable to organization for detection, prevention and mitigation of breaches. Information loss continue to be one of the major threats to organizations. Failing to handle sensitive information leaks is not acceptable for an organization. Inadequate of workflow process is unable to mitigate and contain the sensitive information leaks incident. Arrangement of activities in workflow process is important to facilitate the whole incident response process. Incident handler who are working with incident handling facilitates incident response to accomplish incident workflow process objective. This study explored the perspective of incident handler about the workflow to handle sensitive information leaks incident. Data were collected through incident scenario exercise. The data were analyzed with techniques that include categories, subcategories and summary from incident scenario response. The incident handlers revealed that incident workflow being used in organization has different objective to accomplish incident response. Some of limitation identified include detection and escalation processes of incident in workflow. The result suggested that a new workflow process need to be established as a gatekeeper to coordinate the whole investigation and mitigation process. These improvements of workflow have the implication of detection and escalation process. Several recommendations are given on how to handle sensitive information leaks associated with the present incident workflows. The findings of this study are expected to strengthen the procedure in organization while handling sensitive information leaks incident.
Item Description:Abstracts in English and Arabic.
"A dissertation submitted in fulfilment of the requirement for the degree of Master of Protective Security Management." --On title page.
Physical Description:xii, 49 leaves : illustrations ; 30cm.
Bibliography:Includes bibliographical references (leaves 45-47).