Monday, December 9, 2019

Business Community Disaster Recovery/ Managing Security/ Legal & Ethi

Question: Explain about the Case Study for Business Community and Disaster Recovery/ Managing Security/ Legal Ethical Aspects? Answer: Scenario 1 As a security administrator, if the trunk lines do not work and disrupted in the middle of the night, then I will apply my dedicated team to the site to see there the faults and to see how the loop holes can be rectify and bring back the situation to normal. In that case, to verify offender compliance if the problem takes hours to correct, my policy would be to synchronize the networks for better implementation. Scenario 2 My approach in this case would be to take a backup of the exam sheets on a personal drive because if there is a major problem, the backup will handle the situation well. Moreover, the students giving the exams will be sent a mail about the situation and try to figure if alternative option is there. Scenario 3 In this case, my work would be to troubleshoot the DSL lines to see if there are no minor problems associated with the database of grocery chain. However, providing a GVC filter and Daewoo filter, the DSL lines can be administered well. Exercise 2 It is an incident. To restore operations, an automatic backup must be created to track the files. Here, law enforcement would be involved. It is a disaster. To minimize it, business continuity (BC) plan could be used to repair or buy new PCs. It is not under law enforcement (Berda 2013). It is a disaster. To restore operations, BC plan is used to resume operations. Law enforcement is not used. It is an incident. To restore operations, settle a deal with the critical workers. Law enforcement would be involved (Venables 2013). It is an incident. Here, get a law enforcement law and see what if company wants. In order, see if restore operations were taken. Exercise 3 The walls and doors should be closed (Berda 2013). To perform operations, permission must be granted for proper authorization. Locks and login credentials would also be accessed. On fire detection, proper detectors is to be used by sensors for detecting heat, smoke and flames. The fire suppression is controlled by using fire extinguishers. To observe if right temperature is maintained on the server room for Heating, ventilating, and air-conditioning (Suter and Freese 2012). It is synchronized by using industrial UPS, racks and airflow management and technical and office furniture. Exercise 4 In my perspective, I will take strict actions of Joe, who was caught on the camera. If found he is doing illegal against the company, he can be terminated without giving him a notice and can also be fined under this event or can be penalized to jail. If Joe brings evidences that he is not guilty by clicking pictures of the office room, my idea would be to inspect evidences from the security camera or track Joes cell phone if suspicious things were caught. Exercise 5 In this area, my role would be to access information that grants proper authority. However, I would watch out positions that justify the role of new employees to access information within the company. In order, applying new techniques would remove inappropriate access. To accomplish this, I will create a baseline, automated user provision, strategic access to product control, and proactive use of authentication and passwords. Exercise 6 From table 1, cybercrime is depicted through: Article 2: Illegal access falls under computer as a target and the crime is related to privacy or availability. Article 3: It also falls on computer as a target and is related to system integrity (Nadel 2012). Article 4: It falls on computer as a storage device and is indicated on attack to data integrity. Article 5: It falls on computer as a storage device and is indicated on data confidentiality (Klauser 2013). Article 6: It falls on computer as communication as related to system integrity. Article 7: It falls on computer as a target and is related to privacy or availability (Gledhill 2013). Article 8: It falls on computer as a storage device and is related to system integrity. Article 9: It falls on computer as communication and is related to data confidentiality (Goldman and Pyatt 2013). Article 10: It falls on computer as target and falls on data confidentiality. Exercise 7 To monitor this activity, I will first look on the activities if other employees of the company are not associated to drugs. I will try to monitor companys atmosphere if there is no harm occurred with other employees of the organization. Moreover, I will develop activities among the other employees of the organization, where no involvement of any type of drugs will decrease companys value. Reference List Berda, Y. (2013). Managing Dangerous Populations: Colonial Legacies of Security and Surveillance. Sociol Forum, 28(3), pp.627-630. Gledhill, J. (2013). Conclusion: Managing (In)security in Post-Arab Spring Transitions. PS: Political Science Politics, 46(04), pp.736-739. Goldman, B. and Pyatt, T. (2013). Security Without Obscurity: Managing Personally Identifiable Information in Born-Digital Archives. Library Archival Security, 26(1-2), pp.37-55. Klauser, F. (2013). Spatialities of security and surveillance: Managing spaces, separations and circulations at sport mega events. Geoforum, 49, pp.289-298. Nadel, B. (2012). A private business. London: Quercus. Suter, J. and Freese, S. (2012). Community resources. [Costa Mesa, Calif.]: Saddleback Educational Pub. Venables, M. (2013). News analysis: Safety in numbers? Managing security in crowded places. Engineering Technology, 8(5), pp.22-23.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.