Select a company,either real or fictitious.

profiledavid@0303

  

1) Search "scholar.google.com" for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

2) Select a company,either real or fictitious.

A)  completely describe the company,including the business and where the company is located.

B) determine the minimum services that must be maintained for that company after a disaster.what services should be restored first? what services do you think can be put off until later ?

3) Search "scholar.google.com" for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion?

4) Using a Web browser and a search engine, search the terms “CitiBank backup tapes lost.” You will find many results. Select one article and identify what that article considers a short- coming in CitiBank’s planning. What part of the contingency planning process came up short (IR, BP, or CP)? How could the shortcoming have been prevented?

    • 5 years ago
    • 20
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      SYSTEMINTRUSION.docx
    • attachment
      APPLEINCCOMPANY.docx
    • attachment
      Theroleofend-usersinthecreationofacontingencyplan.docx
    • attachment
      CitiBankbackuptapeslost.docx