Complete independent research and review two (2) to three (3) online end-user license agreements. Compare and contrast each EULA with each other. In your response, please consider the following: ·….
Write a two to three page paper describing your response as the dedicated incident response analyst in this scenario.
You work for a payment credit card organization. During your investigation as an incident response analyst, you have determined that the compromised device that you have collected evidence on in Week 6 – Exploitation Lab is a critical server that the company houses:
- Customer Personal Identifiable Information (PII) such as:
- Name, Address, SSN#s, DOB, etc), .
You have determined in your investigation that daily during after work hours between the hours of 10p to 11pm, that files associated with this data is exfiltrated from the compromised device.
Write a two to three page paper describing your response as the dedicated incident response analyst in this scenario. You are to use your own imaginative/creative response using information and concepts to describe your response that are described throughout this course.
For example: How will you use concepts and terms in this course such as notifying personnel, detection, containment, eradication, recovery, governmental policies, etc. to this Breach Scenario?