Disaster Communications Plan and IT Managers Knowledge Essay and Quiz

User Generated

fxpc12

Computer Science

Description

Assignment 1

As an IT manager, you are an organizational leader.  What is the best way to take the results from an event involving digital forensics and use that knowledge gained in the investigation to improve your organization’s IT Risk processes in order to reduce IT risks?  Your response should avoid scare tactics and fcus on the ethical need to address issues in a way that encourages compliance with the new security measures.

This assignment must follow the APA format.  The target word length for the content is 2,000 words, which will generally be about five double-spaced pages.  The title page and reference pages do not count to this word limit.  Leverage at least three scholarly resources for this paper.


Unformatted Attachment Preview

QUESTION 1 1. In the event of a disaster, where the recovery looks imminent, you should consider waiting to declare a disaster and implementing the DR plan to bring up the disaster recovery facility. True False 4 points QUESTION 2 1. The call list for your disaster communications plan should include which of the following information about the organization’s employees? Non-work e-mail address(es) Home phone number(s) Cell phone OS/Model Cell phone carrier(s) 4 points QUESTION 3 1. Which of the following are fees the textbook mentions related to a disaster recovery facility? Hardware fee Test fee Standby fees Activation fee 4 points QUESTION 4 1. Your __________ is the amount of time between the disaster and when services are restored. Maximum Tolerable Outage Recovery Point Objective Mean Time to Repair Recovery Time Objective 4 points QUESTION 5 1. Your DR plan should include all possible disaster scenarios to be an effective plan. True False 4 points QUESTION 6 1. Which of the following departments was not specifically listed as ones that should be on your Disaster Recovery Committee? Human Resources Legal Janitorial Services Finance 4 points QUESTION 7 1. In the event of a disaster, you must be able to duplicate your entire environment. True False 4 points QUESTION 8 1. Match the term with the general concept for that term. Incident Response A. The ability to establish (or restart) an infrastructure for resuming critical functions after a disaster. Business B. How an organization will resume partially or Continuity Plan completely interrupted critical function(s) within a predetermined time after a disaster or disruption. Disaster C. The steps to follow in the event of a data breach. Recovery D. The immediate steps taken to ensure the protection of people. IT Incident Response Plan 4 points QUESTION 9 1. A __________ backup is one that copies all the data since the last full backup. Full Incremental Differential Disaster 4 points QUESTION 10 1. The “T “in the ACT Model used to plan for individuals in a crisis stands for: Timely Transition Transmission Truthful
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Outline
Topic- computer science Question
The following has been covered in this paper
✓ An IT manager is responsible for executing and maintaining an organization's technology
infrastructure. The organization depends on a central information processing structure to
support well-organized data management and coordination. The IT manager monitors the
company's operational needs, research strategies, and technology solutions and generates
the most cost-friendly and efficient scheme to achieve that objectives.IT manager is also
an organizational leader in such that he can influence his employees to ensure the
organization thrives. He possesses the quality of anticipation also has the intelligence of
setting directions and making plans in detail.
✓ Digital forensics consists of techniques that deal with investigation and searching digital
evidence. It's a forensic science division that involves identifying, gathering, preserving,
investigating, and presenting digital information. It aims at reconstructing the series of
activities that happens in crime scene (Casey,2009). Digital data and media can be
improved from digital devices like phones, laptops, and many more. Digital forensics is
the procedure of investigation of digital data gathered from many digital sources
✓ There are two types of a digital forensics' investigation. A public investigation is an
examination done against the suspected individuals to detect a crime scene. Overall the
administration agencies handle such kind of investigations that relates to public sectors.
The investigation is conducted under criminal investigation procedures since they are
dealt with as a criminal act. A private examination is done from crime about businesses,

organizations, or offices. Any infringement of policies or terms of the private sector falls
in this category of investigation.
✓ The investigation procedure in digital forensic is a step by step process done by experts.
In Information technology, managers are involved in ensuring original evidence isn't
destroyed in the process as they are transferred in the form of data or images from one
medium to another.
✓ The significance of events like incident response plotting and digital forensics are
essential to an organization that works in sensible security sectors. The best cybersecurity
practices are considered valuable to all organizations. If a security incident happened, the
IT managers would be expected to respond and investigate so that they are prepared to
follow structured, valuable, and informed procedures (Selamat, et al. 2008). In any digital
forensic investigation, once interact with the surrounding, it changes, and the evidence is
altered. It is essential to comprehend what activity people have done and work from that
point. As the IT manager, one should be prepared to remove false positives. Disapproving
truth with evidence is equivalent to effective as proving a model during the examination.
✓ Big data forensic investigations are possible to cause a high risk of the right to privacy. It
is the leading risk that organizations face when it comes to digital forensics examination.
The data breach also happens in most cases where the system is attacked to damage the
data. The manager's role here is to ensure that the data is restored. Encryption is the
process of scrambling the information. It is one of the issues Information technology can
face during a digital forensic investigation. The data are decoded and accessed by
permitted people who can decrypt the encrypted information (Lillis, et al. 2016).

✓ Some security measures can be employed in an organization. Application of biometrics
will ensure that authentication, face access control, and precise worker monitoring are
done, hence preening risks. The organization should also try to have a written policy that
serves as a guideline for all its measures. It will allow the security experts and workers to
be on a similar page and offer a way to impose regulations that protects data. Since the
organization owns unique and hidden risks, it is essential to aim at compliance and to
meet all rules to protect sensitive information (Levin, 2021).
✓ It is obvious to encounter issues in information technology. As the manager, one should
encourage his subordinates that it's regular, but they should try to prevent them as much
as possible. First, accept that the issue has happened and don't blame any compliance for
the happening. The impact of cost and effort of managing the issue is more than the
impact of the problem itself. Monitoring the risk is the best tactic if you identify a threat
that can be ordered through the risk event is far o...


Anonymous
Really helpful material, saved me a great deal of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags