Describe the computer security weaknesses present

Assignment Help Computer Engineering
Reference no: EM133520429

Case Study: The headquarters of SoftPlanning, Inc., a private company with annual earnings over $350 million, is in Springfield. This company provides a package of Cloud services for the management and planning of enterprise resources (ERP) to its more than 4,000 clients. Over the past three and a half years, the company has shown constant growth, increasing its profits and customer portfolio at a global level each quarter. As a consequence of this growth, SoftPlanning has also seen the need to expand its data center department. Both the business owner and the sales people are away from their offices most of the time. This is because they are developing and prospecting new customers, so technological planning has been delegated almost exclusively to data center administrators and technical staff.Recently, SoftPlanning moved its headquarters to some remodeled facilities, outside the city. While remodeling these facilities, designers and architects opted to retain much of the original structure, including the exterior of the building and all the internal wood beams. For their part, the workstations and servers are located in open areas with high ceilings and lamps. This configuration makes the data center more comfortable and accessible for the staff working in the center, providing a teamwork and collaborative environment. Before occupying the new facilities, the state inspectors certified the building as safe and in compliance with building codes and security required by the city. That is, the facilities had fire detectors, fire extinguishers, emergency exits, fire alarms and evacuation maps, among others.

As part of SoftPlanning's internal efforts and practices to provide greater security controls and protection to the databases with information from its clients, the company implemented a procedure to keep a backup copy on tape automatically. This process is done once every weekend, overnight, thus avoiding interruptions in the daily operations of the company. All backup copies are carefully labeled and stored on shelves designated exclusively for this purpose by the center's data processing staff. The staff has a manual with specific instructions for all the steps to perform to restore a database data with these tapes in the event of any system or security incident that affects databases. In the same way, the center has a list with all the telephone numbers of center staff to contact in case of an emergency. Recently, SoftPlanning increased their cyber policy from $50,000 to $125,000.

Last Saturday, the building where the SoftPlanning headquarters was located was completely consumed by a fire, so now the company must contact and inform every one of their customers that all their information was destroyed.

Question 1. Describe the computer security weaknesses present in SoftPlanning Data Center narrative case that made disastrous data loss possible.

Question 2. What are the components that should have been included in the SoftPlanning Data Center disaster recovery plan to ensure the recovery of the equipment within 48 hours?

Question 3. What regulations, norms and standards apply to this company?

Question 4. What other factors, other than those included in the disaster plan itself, should have been included?

Reference no: EM133520429

Questions Cloud

What is a mesocycle training plan for the transition : What is a Mesocycle training plan for the Transition Period-Post Season with a focus on Rest.
Critically discuss the mental health experiences of anna : Critically discuss the mental health experiences of Anna within recovery oriented and trauma informed ways. Please ensure to use examples from memoir to provide
What responsibility as healthcare consumer : What responsibility, as a healthcare consumer, does John have for his won medical condition?
What advice should we think the barefoot college students : what advice should we think the Barefoot College students would give to US college graduates?
Describe the computer security weaknesses present : Describe the computer security weaknesses present in SoftPlanning Data Center narrative case that made disastrous data loss possible.
What are the upstream regulators of parathyroid function : In other words, what is the normal ?ow of information to either stimulate or suppress parathyroid function?
Define the four components of the nursing metaparadigm : Define the four components of nursing metaparadigm. How are the six CCN philosophical constructs reflected within your perspective of the nursing metaparadigm?
Analyze the information presented in these articles : Analyze the information presented in these articles on factor analysis and describe how it is used to validate the constructs of the instruments
What are three things that create positive culture in teams : What are three things that create positive culture in teams? Be specific in your response and share what will help improve the culture within a team.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd