Reference no: EM131390167
Assignment
Evaluating an SAP After a Disaster
When disaster strikes, an organization can deteriorate into chaos very quickly. Whether it's a natural disaster like an earthquake or a man-made disaster such as a system security breach, how well your organization will respond is absolutely dependent on your employees. If your organization has provided effective training, your company's personnel can take well-timed steps to curtail negative impact, get systems back on-line, and have your organization back to normal quickly. If they have little training, or the training is poorly planned, things can go from bad to worse in the blink of an eye.
Consider the following scenario. Advanced Topologies has been beset by another security breach, but this one has had disastrous results. The company's website has been hit by a distributed denial of service (DDoS) attack. It took the organization's IT personnel 2 full days to rectify the situation. Advanced Topologies has contacted you to assist in the aftermath of the disaster.
For this Discussion, you will analyze the specifics of the attack and determine what could have been done to avoid this disastrous security breach. To do this, watch the media piece "A Distributed Denial of Service Attack on Advanced Topologies" in this unit's Learning Resources. After viewing the DDoS media, review the security awareness program you developed for Advanced Topologies.
Post a 350- to 500-word evaluation of the attack. Include a description of how you would respond to and recover from problems in the wake of this unforeseen disaster. In addition, describe any improvement to your security awareness program that would help the staff be better prepared for such disasters in the future
Media: Laureate Education, Inc. (Executive Producer). (2013a). A distributed denial of service attack on advanced topologies[Interactive media]. Baltimore, MD: Author.
In this media piece, you will examine the aftermath of a security attack on Advanced Topologies, Inc., and post an analysis of how well your Security Awareness Plan would have performed against such an attack.
What you have put together for advanced topologies inc
: For this Discussion, you will evaluate security metrics based on what you know and have put together for Advanced Topologies, Inc.
|
Write a comment about the article on cultural values
: Great post Richard, i can also add that , Carteret (2011) in her article on Cultural values of Asian patients and families, she mentions that Asians tend to be highly group-oriented people who place a strong emphasis on family connection as the ma..
|
Is there a difference between the mean degree of lateness
: Is there a difference between the mean degree of lateness of company 3 and that of the averages of companies 1 and 2? Test at the 5% level of significance.
|
Write a comment about the given post
: Great information Melina, also, according to "Asian Nation", many barriers prevent Asian American women from receiving the help that they need to escape domestic abuse. Perhaps the most damaging is the tradition and legacy of male dominance and pa..
|
What could have been done to avoid the disastrous security
: For this Discussion, you will analyze the specifics of the attack and determine what could have been done to avoid this disastrous security breach.
|
Discuss about the evaluation of the literature
: In this assignment, students will pull together the change proposal project components they have been working on throughout the course to create a coursework portfolio inclusive of sections for each content focus area in the course. At the conclus..
|
Describe possible lan topologies that could used at location
: IT 340- Describe possible LAN topologies that could be used at the new location. Compare the identified LAN topology possibilities based on their relativestrengths and weaknesses in regard to support practices.
|
What levels of additive and catalyst would you prefer
: What is your conclusion regarding the significance of the factors or their interactions? Test at the 5% level of significance.
|
Under what circumstances do page faults occur
: Under what circumstances do page faults occur? Describe in detail the actions taken by the operating system when a page fault occurs. When a process ?rst starts execution, how would you characterize the page-fault rate?
|