Notifications
Clear all

There's a thief !

11 Posts
5 Users
0 Likes
3,749 Views
 Zoey
(@zoey)
Posts: 5
Active Member
Topic starter
 

Someone can help me how to assess severity impact of the data theft in organization?

 
Posted : 17/05/2018 8:47 am
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
 

How can I help?

 
Posted : 17/05/2018 9:09 am
RolfGutmann
(@rolfgutmann)
Posts: 1185
Noble Member
 

Can you explain your question more detailled pls?

 
Posted : 17/05/2018 9:33 am
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

Someone can help me how to access severity impact of the data theft in organization?

access or assess? ?

https://users.wpi.edu/~nab/sci_eng/99_Jul_05.html

jaclaz

 
Posted : 17/05/2018 10:37 am
passcodeunlock
(@passcodeunlock)
Posts: 792
Prominent Member
 

@jaclaz very nice remark from a non-native English speaker )

For me "assess" makes sense in the original post.

 
Posted : 17/05/2018 11:42 am
jaclaz
(@jaclaz)
Posts: 5133
Illustrious Member
 

@jaclaz very nice remark from a non-native English speaker )

For me "assess" makes sense in the original post.

Sure it does ) , hence the question, it is very common even for a native speaker to use a wrong spelling for similarly sounding words.

Our good US friends of course are famous for giving to similar sounding words *any* spelling they see fit, and even manage to sue for "phonetic trademark infringement" 😯
https://en.wikipedia.org/wiki/Microsoft_vs._MikeRoweSoft

Thank you for the compliment wink
http//www.dictionary.com/e/compliment-vs-complement/

jaclaz

 
Posted : 17/05/2018 1:08 pm
(@trewmte)
Posts: 1877
Noble Member
 

Zoey here are some links you may find helpful regarding data theft and issues associated with assessing severity and impact

Series of articles about assessing severity
https://www2.idexpertscorp.com/knowledge-center//single/hurricane-data-breach-assessing-severity-in-the-eye-of-the-storm
https://www2.idexpertscorp.com/knowledge-center//single/assessing-data-breach-severity-employee-downloading-malware
https://www2.idexpertscorp.com/knowledge-center/single/assessing-data-breach-severity-third-party-incident-expose-credit-card-data

Other useful reading
https://www.enisa.europa.eu/publications/dbn-severity/at_download/fullReport
https://www.ponemon.org/local/upload/file/Aftermath_of_a_Data_Breach_WP_Final%20.pdf
https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_gdpr_project_risk_white_paper_21_december_2016.pdf
https://www.shredit.com/getmedia/9836c4ce-5d0b-46f1-9b45-1f16f885d790/Shred-it_Data_Breach_Costs_USA.aspx?ext=.pdf

However, there is a large body of reading material available from use google search engine

 
Posted : 17/05/2018 1:12 pm
 Zoey
(@zoey)
Posts: 5
Active Member
Topic starter
 

Someone can help me how to access severity impact of the data theft in organization?

access or assess? ?

https://users.wpi.edu/~nab/sci_eng/99_Jul_05.html

jaclaz

Sorry my bad. Typing error lol
thanks for correcting me wink

 
Posted : 17/05/2018 6:03 pm
 Zoey
(@zoey)
Posts: 5
Active Member
Topic starter
 

Can you explain your question more detailled pls?

actually something happened in my company due to our negligence in managing important information in the server. The problem gets bigger when there are workers who are selfish and indiscriminately copy the information for personal use.

 
Posted : 17/05/2018 6:16 pm
 Zoey
(@zoey)
Posts: 5
Active Member
Topic starter
 

Zoey here are some links you may find helpful regarding data theft and issues associated with assessing severity and impact

Series of articles about assessing severity
https://www2.idexpertscorp.com/knowledge-center//single/hurricane-data-breach-assessing-severity-in-the-eye-of-the-storm
https://www2.idexpertscorp.com/knowledge-center//single/assessing-data-breach-severity-employee-downloading-malware
https://www2.idexpertscorp.com/knowledge-center/single/assessing-data-breach-severity-third-party-incident-expose-credit-card-data

Other useful reading
https://www.enisa.europa.eu/publications/dbn-severity/at_download/fullReport
https://www.ponemon.org/local/upload/file/Aftermath_of_a_Data_Breach_WP_Final%20.pdf
https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_gdpr_project_risk_white_paper_21_december_2016.pdf
https://www.shredit.com/getmedia/9836c4ce-5d0b-46f1-9b45-1f16f885d790/Shred-it_Data_Breach_Costs_USA.aspx?ext=.pdf

However, there is a large body of reading material available from use google search engine

thank you so much ! i will read it one by one. it was very helpful. )

 
Posted : 17/05/2018 6:20 pm
Page 1 / 2
Share: