DISASTER RECOVERY
Discussion 1 TOPIC
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion
INITIAL POST
A 250 word for initial post must be posted to the discussion forum.
Secondary POST
Please write a response to below answer for 200 words:
Answer:
The network intrusions are defined as unauthorized activity on computer networks. There are different types of attacks that can have impact on entire network activity of organization. The demand of utilizing devises which are connected to network is increasing and this usage without any security aspects is leading to many security issues. With request of use, the kinds of assaults are expanding from unstructured to. structured and planned attacks. To address these issues we should have a strong intrusion system in place. The assault which I will clarify was occurred in South Korean digital military unit. This unit was a casualty of digital assault that occurred on systems. By having biggest web infiltration rate on the planet enormous piece of banking and taxpayer supported organizations are digitalized.
Every single cyber-attack will have different purpose, some attacks may have intention to spoil the companys reputation and some has intention to take the data and mis uses it. digitization (Baig, 2017). Is making cities better and gathering all information to one place which is really making hackers to perform actions against it. in this attack hackers took access of most of the information, which is presented like their names, account details and other financial informations. When such incidents happens company or government should be ready to address and have plan of action in ready.
To control the activities against these exercises, this nation made fitting activities and pursued pre-characterized manuals to address these assaults. Where innovation occurred a large portion of the improvements, these interruptions will annihilate. The foundation and interfere with the administrations to maintain a strategic distance from the outcomes, numerous interruption recognition frameworks are by and by, neural systems are one among them, which capacities all the more decisively to distinguish the bizarre movement in the framework (Baig, 2017). Furthermore, the speed of systems is changing is truth to fulfill the needs of clients. As IOT is a touchy objective for the greater part of the system interruptions, improvements into interruption recognition in hereditary calculation is occurring
Discussion 2 TOPIC
Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end-users in the process of creating the contingency plan? What are the possible pitfalls of end-user inclusion?
INITIAL POST
A 250 word for initial post must be posted to the discussion forum.
Secondary POST
Please write a response to below answer for 200 words:
Answer:
Contingency plan is nothing but the backup plan for the organizations in order to protect the business infrastructure from any kind of security incidents and threats. In the event of disasters, organizations can quickly continue the main business operations when they develop the contingency plan and prefer the best back up strategies for the organizations. When disruptions occurs in the business and disasters strikes the primary business operations it completely impacts the main agenda and hits the complete organizational productivity (Geelen, 2013).
The primary goals of the contingency plan is protect the data from suspicious incidents and involving the end users in the plan have unique benefits specially to handle the potential attacks on the networks and systems. There are the occasions when organizations developed the contingency plans but never used it but it is beneficial to take the advanced step and protect the vulnerable assets from the security incidents with the help of contingency plan and end users in the entire plan (Geelen, 2013).
When organization experiences the disasters, the situation will be critical to take the immediate action and any delay in taking the action may create more issues by end of the day. Hence it is needful to take the required action and quickly work on the solutions to minimise the major impacts of the disasters and other uncertain incidents. A well-documented contingency plan gives the best ways to the organizations and protect the primary business assets from the suspicious incidents and activities. Hence it will be the effective ways to develop the contingency plan and work with the end users for better resolution (Tarafdar, 2010).
Discussion 3 TOPIC
Search “scholar.google.com” for a company or school that has reported issues, problems, concerns about their backup procedures. Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about the off-site storage of backups?
INITIAL POST
A 250 word for initial post must be posted to the discussion forum.
Secondary POST
Please write a response to below answer for 200 words:
Answer:
Everyday every minute there has major increase in usage of the Internet which helps in collecting the data from the customers and from public members as it gets easier. All the information is gathered without any acknowledgment of the customers and there will not cause any obstruction to the customers. In general all the websites or any other organizations as such business organizations or schools, universities customers or students are required to submit all the personal details as such Phone number, Name, age and other personal details. Now it is required for all the organizations from major to minor firms it is required to have security to save from internet breaches. The online sites have major chance in having internet cookies where it is easy to gather the information for internet hackers. They should be protected from all the available and latest technologies which supports and protects information. Here the problem can raise either from the users as they tend to provide information that has been asked online. Here, we must know the correct differentiation between the valid websites and unauthorized websites as they tend to hack information that has been mentioned by us as this causes no obstruction for the hackers in order to gather the information.
Now that the awareness has been increased there are now fewer chances for hacking and people are aware on which online site they can trust and which is not. Major changes should take place in business organization websites and universities (Hurley, C. 2015). There are latest and advanced technologies which support the organization websites from data breaching and gives proper security to the organization. Inbuilt security steps should be followed by the organizations as such contingency plan, end users plan and data security steps are to be followed. Since data protection is the most concern, all the employees should be well trained and educated regarding the technologies and also the data protection concerns. Companies use privacy protection in order to gain trust and loyalty from customers. Major changes that a website should be taken by maintain the proper IP address, end to end encryption with proper Identification number. By following these steps then there are fewer chances of data breaches.