[Solved] Sensitive Information Belonging

[Solved] Sensitive Information Belonging

Assume that your company has suffered a security breach in which it appears that some sensitive information belonging to your clients may have been accessed by unauthorized users. You do not know if the breach resulted from an internal source or an external source. In analyzing your network traffic, address the following in your main post:

  • Describe the types of traffic you will look at in order to uncover the source of the attack
  • Explain the tools you are going to use.

After your main post, reply to a minimum of two classmates’ posts and analyze the tools and methods you would use in comparison with those of your fellow learners. Each response must be substantive and advance the discussion while focusing on concepts related to materials in this module.

Need help with your assignment? Hire Premiumessaytutor.com for quality assignment help and get Get 15% discount on your first order
Our experts will take care of your assignment no matter the deadline!
Use the following coupon
"SAVE15"

Order Now