discussions

Anonymous
timer Asked: Mar 8th, 2019
account_balance_wallet $50

Question Description

Note: EACH DISCUSSION HAS 650-700 WORDS AND 7-8 REFERENCES

No plagiarism accepted

Unformatted Attachment Preview

Note: EACH DISCUSSION HAS 650-700 WORDS AND 7-8 REFERENCES No plagiarism accepted Discussion 1 Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion. Discussion 2 Search "scholar.google.com" for a company or school that has defined the role of end- users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? Discussion 3 Search "scholar.google.com" for a company or school that has reported issues, problems, concerns about their backup procedures. Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups? Discussion 4 Search "scholar.google.com" or your textbook. Discuss the technical skills required to have a CSIRT response team consisting of employees with other job duties (i.e., not a full-time CSIRT job category)? Why or why not? What factors will influence their decision? Discussion 5 Search "scholar.google.com" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident? Discussion 6 Search "scholar.google.com" or your textbook. Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team? Discussion 7 Search "scholar.google.com" or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment. Discussion 8 Search "scholar.google.com" or your textbook. Discuss the issues organization’s face with regards to the protection of its customer information. How might an organization notify its users that all communications are being monitored and preserved? How will end users typically respond to such announcements? ...
Purchase answer to see full attachment

Tutor Answer

MariaTheBest
School: University of Maryland

Attached.

Running Head: BACKUP SYSTEMS

1

Backup Systems
Institutional Affiliation
Date

BACKUP SYSTEMS
As organizations and companies grow, so does the amount of data they deal with. Storage
and retention of this information have become an issue as an increase of data requires more
storage space and security and technology may not always provide the best or cheapest solutions
for data protection. Despite the available resources data backup is important as it helps keep
information safe when there is system downtime or failure and restoration of information easy
especially in times of an emergency. It is also very important for backups to be performed
quickly and constantly. Lack of which disasters arise, one such disaster happened in Britain in
2008 after an employee from the British Home Office lost data on 84,000 prisoners from Wales
and England. He downloaded data into a thumb drive and did not back up the information
elsewhere then ended up misplacing the USB drive along with information on prisoners release
dates, personal data, and information on their charges and programs they were to undertake. This
happened due to the lack of a modern and secure infrastructure and security policies to prevent
possible data loss (Stringer, 2008).
Securing data is as important as securing the backups from loss and data breaches, this
often varies according to organizations. This security measures can be done by giving backup
access to only to the involved people for safety purposes. There have been various cases of
backup loss or theft, such as the loss of personal backup tapes on five million former and current
United States Soldiers from an employee of militia health provider where they received medical
care. It included addresses and numbers, Social Security numbers, lab results, clinical and
prescription notes. The data wasn’t encrypted due to lack of proper technical information and
retrieving it required certain knowledge on data structure and the systems used which were hard
to access. Loss of this information could affect the function of the facility and its service
provision to the officers as well as face a lawsuit in case the information is used maliciously

2

BACKUP SYSTEMS
against the owners. To safeguard against such cases data should always be stored in a safe
location especially when it’s that confidential. It should always be encrypted and be trackable
when offsite. Backups can be stored in offsite storage facilities with proper safety measure to
protect against physical incidents. The administrator can use a strong password but encrypt them
as well. Whether software or hardware they should always be included in the disaster recovery
plans in case of any incident.
Offsite data backup usually involves storing data in another secure climate controlled
location in case of a site-wide disaster, it was mostly done using hardware such as hard drives
but, this has recently changed with the launching of cloud computing (JoSEP, KAtz,
KonWinSKi, Gunho, PAttERSon, &RABKin, 2010). This has brought the option of online
backup systems where data is sent over a public network to a server that is offsite. Online
backups are cheap as they do not require hardware and you outsource activities such as software
and hardware upgrades to the vendor, hence have minimal maintenance (Trimmer, Stager,
Johnston, &Blaser, 2006). It is more flexible to send and retrieve the data as you only have to
access it remotely from anywhere you are and you do not need to hire personnel who will take
care of backup infrastructure. It is fast to retrieve data when there is a hardware failure and
makes it easy to scalar resources. It is also highly secure as it can be stored in secure data
containers and only the people allowed will have the codes to access it, and data is also safe from
physical disasters such as fires and floods. However, it also has its own disadvantages such as the
data is inaccessible without the internet. To back up or retrieve large amounts of data could take
a lot of time and bandwidth. Irrespective of these shortcomings, data backup is important and
could provide a competitive advantage while marketing. Data security is the most important
factor in maintaining company reputation and the smooth flow of business activities.

3

BACKUP SYSTEMS

...

flag Report DMCA
Review

Anonymous
Thank you! Reasonably priced given the quality not just of the tutors but the moderators too. They were helpful and accommodating given my needs.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors