Reference no: EM131329942
Iris tried not to smile. "Of course, it isn't technically a disaster," she explained, "but I understand what you mean. How much information is lost?" Joel looked at her in dismay. "Lost? All of it! We had just saved the report and sent it to the department print server!" "Where did you save it," Iris asked.
"To your local drive or to the department share?" Joel tried to remember. "I think it was to the G: drive," he said. "Why?" "Well, the G: drive is on a machine at the end of the hall, which wasn't affected by this incident," Iris replied. "It's probably fine.
And if you did save it to your local drive, there's a high probability we can get it anyway, one way or another. I doubt the water damaged the hard drive itself." Iris paused for a moment, then continued: "We were lucky this time," she said. "No one was hurt, and if the fire had spread to the next room, where there are more valuable assets, things would have been much worse."
Discussion
1. Extrapolate on the case. At what point could this incident have been declared a disaster?
2. What would Iris have done differently if this adverse event had been much worse and had been declared a disaster?
3. Identify the procedures that Joel could have taken to minimize the potential loss in this incident. What would he need to do differently in the event of a disaster, if anything?
Dwsign an incident response plan
: Dwsign an incident response plan for your home computer. Include actions to be taken if Virus attack, Power failure events occur.
|
What is banning or destruction of religious images called
: What is the banning or destruction of religious images called? What is a place of worship where Muslims gather on Fridays? Which Islamic art form was most well-known and accepted best in Europe?
|
Permanent magnet and an electromagnet
: Discuss the difference between a permanent magnet and an electromagnet. What are some practical applications of each?
|
Discuss the strategic value of personnel training
: Discuss the strategic value of personnel training and development. What are the implications for the MNC
|
Identify the procedures that joel could have taken
: Extrapolate on the case. At what point could this incident have been declared a disaster?- What would Iris have done differently if this adverse event had been much worse and had been declared a disaster?
|
Find an expression for the final temperature
: Two closed, rigid water containers with initial temperatures TA and TB are brought into thermal contact. At equilibrium, the two containers are at the same temperature.
|
Describe the term performance booster
: Respond to t he following questions in one essay. At least three to four paragraphs for each question with examples is expected. Describe the term performance booster(s) and how it relates to a Virtual Teams
|
What is information security policy
: What is information security policy? Why it is critical to the success of the InfoSec program? Of the controls or countermeasures used to control InfoSec risk, which is viewed as the least expensive?
|
Arise from poor network documentation
: What are some of the best practices that are used to optimize networks and what might be some of the pitfalls that can arise from poor network documentation?
|