Case Study(Method)

 In order to evaluate data breach response tactics and their effectiveness in lessening the impact of incidents, a qualitative research approach was used for this case study. A thorough examination of the literature was done to compile case studies, industry reports, scholarly pieces, and research articles on data breach response that were pertinent. The search included academic databases like IEEE Xplore, ACM Digital Library, and Scopus in addition to sources unique to the industry, like cybersecurity articles and reports.

A combination of terms and Boolean operators were used in the search approach, including "data breach response," "incident response frameworks," "proactive threat intelligence," "employee training," "legal considerations," and "incident response automation." Studies on data breach response plans and best practises that were authored in English and published within the last ten years were all eligible for inclusion.

Numerous articles from the initial search were filtered based on their titles and abstracts. The references of the publications that were chosen for full-text study were also looked at to find any additional sources that might be of interest. The complete collection of publications also contained case studies, industry reports, and academic research papers that offered insights into many facets of data breach response.

The studies that were chosen addressed many different aspects of data breach response, such as incident response frameworks, proactive threat intelligence, employee awareness and training, legal and regulatory issues, and incident response automation. In order to find common themes, difficulties, and best practises in data breach response, these papers were analysed, contrasted, and synthesised.


Reference:

Anderson, T., Caldwell, B., & Kansa, R. (2019). The Role of Threat Intelligence in Cybersecurity Operations. Journal of Information Systems Applied Research, 12(1), 4-11.

Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2020). Incident Response Automation: Towards a Needs-Based Taxonomy. IEEE Security & Privacy, 18(2), 32-40.

Comments