University of Nairobi Disaster Recovery Discussion

User Generated

Cnaqn987

Computer Science

University of Nairobi

Description

From Chapter 1, page 37, Real World Exercise 1.4

https://imgur.com/a/ksgB33z

download the book, and answer the questions from the link above.

Michael E. Whitman, Herbert J. Mattord, Andrew Green. Principles of Incident Response and Disaster Recovery (2014). Cengage Learning. ISBN: 978-1111138059.

I don't have access to the text book, the tutor is responsible for downloading and sending the digital copy of book to me.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello. Please find the final answer attached.Cheers!!

Running Head: DISASTER RECOVERY

1

Disaster recovery
Student Name
Institutional Affiliation
Date

Disaster recovery
Exercise 1-1
The security policies I viewed are for Apple. The main areas that the policies cover are the
organizational aspects, the system-specific aspects, and issue-specific aspects. These aspects are
similar to the ones covered in the policies’ manual for our institution.
Exercise 1-2
The most dangerous computer security threats today include phishing, ransomware,
cryptojacking, physical attacks, government-sponsored attacks, IoT attacks, and social
engineering attacks. All of the threats are dangers to ...

Similar Content

Related Tags