Disaster recovery plan and security awareness

Assignment Help Basic Computer Science
Reference no: EM133086417

Assignment 1. Disaster Recovery Plan

There are threats all around us, so it is essential to have a robust plan in place to help mitigate the damage to a business from these threats.

1. Select any one of the threats that have been covered in the Business Continuity chapter of the text and develop a Disaster Recovery Plan (DRP).

2. The plan, at a minimum, should include a summary of the threat, a risk assessment, and a mitigation strategy (to include goals, actions, and implementation plans). You will need to identify specific design principles that could be violated, as well as appropriate operational plans to be taken

3. Include how you will restore the IT resource, incident response procedures, and contingencies (to include techniques by which to test the disaster recovery plan's effectiveness). You will need to identify security monitoring tools and techniques, fundamental security concepts, and appropriate management methodologies.

4. Make sure to consider any internal and external regulatory and legal compliance requirements. You will need to identify how the fundamental elements of governing framework can provide system security, as well as be able to differentiate between legal, regulatory, and framework compliance.

Assignment 2. Security Awareness

It has been proven that employees can be a huge asset for an organization's cybersecurity. If employees are provided with proper security awareness training, they can act as another line of defense for an organization. Therefore, creating a culture of security awareness within a business is highly beneficial.

Research several employee security awareness training plans, tools, and techniques. Outline the ten most important security awareness topics that should be presented to employees. For each, provide a unique way in which an organization can address each topic in the workplace (this can include email communications, posters, webinars, etc.)

1. How can leadership promote diversity, effectiveness, and responsiveness in addressing security awareness?

2. How can teamwork support security awareness and ensure everyone is aware of their role in keeping the company secure?

3. One of the purposes of security awareness training is to reduce the risk of a data breach. There are two major risk factors: people and devices. Some people have to be granted access to regulated or sensitive information; you cannot simply disallow all access to the data. But sometimes their deliberate actions can lead to a data breach of valuable company data. Discuss how to value human dignity while enforcing security regulations from a Christian worldview.

Reference no: EM133086417

Questions Cloud

Sociology matters in your life and career : How can you apply these skills to both sociological questions and problems you are facing in your personal and professional life?
Information security-digital world : What is information security? What are some of the challenges associated with keeping your own information safe within the digital world?
About importance of embracing technology : You have learned about the importance of embracing technology throughout history and will be asked to use PowerPoint in your assignment presentation
Define boundaries of the system : Define Boundaries of the System. Determine performance expectations. Describe who should be on the systems analysis team
Disaster recovery plan and security awareness : Select any one of the threats that have been covered in the Business Continuity chapter of the text and develop a Disaster Recovery Plan (DRP).
Computer-based forensic tools : The number of computer-based forensic tools has been on the rise over the last 10 years, making it extremely difficult to select the right tool for the job
Fiscally responsible risk-based strategy : How you would prioritize based on a fiscally responsible risk-based strategy, and what would be your prioritized remediation strategy for the vulnerabilities?
Creating draft for security policy : Your director has tasked you with creating a draft for a security policy. Explain why you chose those points and how they work to protect your organization.
Career path : Explain how the knowledge and concepts provided in this course will better prepare you for your chosen career path.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd