Access over 35 million academic & study documents

20200830212204organizational Management During Times Of Crisis 1

Content type
User Generated
Subject
Computer Science
School
Campbellsville University
Type
Homework
Rating
Showing Page:
1/21
Running Head: RECOVERY FROM A CRISIS i
Recovery from a Crisis

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/21
RECOVERY FROM A CRISIS ii

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/21

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 21 pages?
Access Now
Unformatted Attachment Preview
Running Head: RECOVERY FROM A CRISIS Recovery from a Crisis i RECOVERY FROM A CRISIS ii RECOVERY FROM A CRISIS iii Abstract With the advancement of technology, no organization is safe online and digital attackers have also improvised new attacking tactics aiming at getting access to some essential data of some targeted organizations. Even though the threats have been increasing, it is the role of the organizational management to ensure the systems are not only safe but also updated to repulse the digital attacks directed at their organizations. However, scholars argue that even though better security measures are put in place, the systems still exhibit some loopholes that are used by attackers to access the organization’s system and compromise their data secretly. For this reason, any organizational management has a significant role to play in the quest to manage a cyber-attack and recover from the damages incurred. This research follows a qualitative approach by evaluating the existing literature from different scholars and concluding on the best steps and approaches any management should follow when a cyberattack has been done to the organization. From the research, 20 % of the organizations did not recover and retrieved their essential data. Of the organizations that recovered from the attack, 42% of them had to invest heavily in computer security experts who helped them in retrieving the data and ensuring that the organization put up the required security measu ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents