Reference no: EM131311727
Evaluating an SAP After a Disaster
When disaster strikes, an organization can deteriorate into chaos very quickly. Whether it's a natural disaster like an earthquake or a man-made disaster such as a system security breach, how well your organization will respond is absolutely dependent on your employees. If your organization has provided effective training, your company's personnel can take well-timed steps to curtail negative impact, get systems back on-line, and have your organization back to normal quickly. If they have little training, or the training is poorly planned, things can go from bad to worse in the blink of an eye.
Consider the following scenario. Advanced Topologies has been beset by another security breach, but this one has had disastrous results. The company's website has been hit by a distributed denial of service (DDoS) attack. It took the organization's IT personnel 2 full days to rectify the situation. Advanced Topologies has contacted you to assist in the aftermath of the disaster.
For this Discussion, you will analyze the specifics of the attack and determine what could have been done to avoid this disastrous security breach. To do this, watch the media piece "A Distributed Denial of Service Attack on Advanced Topologies" in this unit's Learning Resources. After viewing the DDoS media, review the security awareness program you developed for Advanced Topologies.
Post a 350- to 500-word evaluation of the attack. Include a description of how you would respond to and recover from problems in the wake of this unforeseen disaster. In addition, describe any improvement to your security awareness program that would help the staff be better prepared for such disasters in the future.
Media
Laureate Education, Inc. (Executive Producer). (2013a). A distributed denial of service attack on advanced topologies[Interactive media]. Baltimore, MD: Author.
In this media piece, you will examine the aftermath of a security attack on Advanced Topologies, Inc., and post an analysis of how well your Security Awareness Plan would have performed against such an attack.
What competitive forces have challenged the tv industry
: What competitive forces have challenged the TV industry? What problems have these forces created - Describe the impact of disruptive technology on the companies discussed in the case and how have the cable programming and delivery companies responded..
|
How monetary policy could influence the long-run behavior
: Discuss how government policies can influence economic growth. Analyze how monetary policy could influence the long-run behavior of price levels, inflation rates, costs, and other real or nominal variables.
|
Business strategy for entering cell phone service industry
: Which of the three generic strategies would you choose as your primary business strategy-overall cost leadership, differentiation, or focus?
|
Describe language as having six different properties
: Jim and Sue just had a baby, and they are interested in learning more about the process of language acquisition. They have heard about the controversy surrounding the view that speech is special. Do you think speech is special or is it processed l..
|
Evaluating an sap after a disaster
: When disaster strikes, an organization can deteriorate into chaos very quickly. Whether it's a natural disaster like an earthquake or a man-made disaster such as a system security breach, how well your organization will respond is absolutely depen..
|
Explain role asymmetric information has economic transaction
: Explain role asymmetric information has in many economic transactions. The Condorcet Paradox and Arrow's Impossibility Theorem in the political economy. People not being rational in behavior economics.
|
Analyze how it could lead to problems in understanding
: Assume there will be a business transaction between yourself and someone from the other country you have selected. You will introduce one similarity and explain how this may be a benefit in this interaction. Then you will introduce one difference ..
|
Who are looking to automate their accounting
: Your accounting firm has been asked to recommend an online accounting system for several businesses who are looking to automate their accounting.
|
Search for jobs that relate to your career
: Search for jobs that relate to your career. Read through several of the job postings and determine what IT skills you need to acquire.
|