Identify three commercially available technology solutions

Assignment Help Computer Network Security
Reference no: EM131299341

Cybersecurity DR / BCP Presentation & Briefing Memorandum

The focus of this assignment should be DR / BCP technology solutions for response and recovery after a cyber security incident of sufficient duration and impact to require activation of the organization's Disaster Recovery and/or Business Continuity Plan.

You may focus upon the incident reported upon in your cybersecurity research paper OR you may take a more general approach.

Suggested technology solutions include:

· General DR/BCP Services

o Palindrome https://www.youtube.com/watch?v=d60m6hUpgvs

· Data Backup Solutions

o Acronis https://www.acronis.com/solutions/smallbusiness/

· Cloud Computing (Infrastructure as a Service, Software as a Service, Platform as a Service)

o VMWare https://www.vmware.com/solutions/datacenter/business-continuity/disaster-recovery.html
o NetApp https://www.netapp.com/us/solutions/data-protection/business-continuity.aspx

· Mobile Data Centers / Mobile Workspace Solutions

o https://www.youtube.com/watch?v=0XCR7aG1Wvc (Sunguard)
o https://www.youtube.com/watch?v=G1oo9y4w1ZY (US Corps of Engineers)

· Emergency Communications Centers / Crisis Management Command Centers
· Cyber forensics and incident response services

o https://www.drivesaversdatarecovery.com/recovery-services/forensics/
o https://www.lwgconsulting.com/
o https://www.boozallen.com/consulting/transform-technology/cyber-technologies/eDiscovery

· Cyber incident analytics services

o https://www.youtube.com/watch?v=yXnVqKaCr9g
o https://www.boozallen.com/consulting/delivering-results-that-endure/cyber/50146704/cyber-incident-response

1. Discuss the importance of disaster recovery and/or business continuity planning with respect to maintaining the confidentiality, integrity, and availability of information and information systems.

2. Identify three commercially available technology solutions (products or services) which could be used to address cybersecurity problems specific to DR / BCP.

3. Research and report upon each of the three technology solutions. For each solution include:

a. Vendor (name and Web site)
b. Product Name and Capabilities
c. How this product or service can be used to support DR / BCP including protecting / restoring confidentiality, integrity, and availability of information and information systems.

4. Provide a summary in which you discuss the benefits of incorporating technology-based solutions when planning for recovery and restoral of IT operations.

1. Grammar / Mechanics / Writing Style

a. Professional appearance
b. Proper grammar, punctuation, spelling, etc.
c. Presentation Format (10 - 20 slides)

i. Title Slide
ii. Importance of DR / BCP to cybersecurity
iii. Technology Solutions Overview
iv. 3 to 5 Slides per Product or Service
v. Summary
vi. Sources Attribution / References slide per instructor's guidance

d. Briefing Memorandum Format

i. To / From / Subject / Date Format
ii. Numbered Paragraphs
iii. Single spaced within paragraphs
iv. Provides summary to support presentation slides
v. No more than 3 pages (one page summary preferred)
vi. Sources Attribution / References in memorandum per instructor's guidance

2. Source Attribution / References

a. You must provide appropriate attribution / credit to sources for information used in the presentation and memorandum.
b. APA style guidance does not specifically address presentations and memoranda
c. Your instructor will provide examples of appropriate citation styles for use in business communications, e.g. presentation slides and memoranda.

Reference no: EM131299341

Questions Cloud

Why the count of unemployed people is not a valid measured : Use these facts to explain why the count of unemployed people is not a valid measure of the extent of unemployment.
Identify factors that influence chief executive remuneration : Determine how this information can be used to identify the factors that influence chief executive remuneration - Univariate and bivariate analysis and discussion which looks at the possible determinants of CEO remuneration - Determine how this inform..
Influence of some actors on the world stage : Globalization has increased the influence of some actors on the world stage and decreased the influence of others. Of the five actors listed below, which ones have increased and which ones have decreased? Why? (Actors: states, IGOs, NGOs, MNCs, ne..
Government securities from a commercial bank : Using a required reserve ratio of 10% and assuming that the banks keep no excess reserves, which of the following scenarios produces a larger effect on the money supply?
Identify three commercially available technology solutions : Identify three commercially available technology solutions (products or services) which could be used to address cybersecurity problems specific to DR / BCP.
How did the researchers measure intelligence : The Case Study that opened the chapter is motivated by research conducted in 1991 by Willerman, Schultz, Rutledge, and Bigler. Read about this study in the EESEE story "Brain Size and Intelligence," and use what you have learned in this chapter to..
Determine the noise contribution of i1 and i2 : Determine the noise contribution of I1 and I2 in Figure to the input for minimum and maximum gain settings.- Neglect the on-resistance of the switches, channel-length modulation, and body effect.
Is curve and lm curve in the current period : Explain what effect an increase in the future expected interest rate will have on the IS curve and LM curve in the current period.
Create a vendor database and related reports : Create a vendor database and related reports and queries to capture contact information for potential PC vendors. This information will be used to populate an MS Access database.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd