Disrupted again in the future due to hurricane

Assignment Help Basic Computer Science
Reference no: EM132358116

Disaster Recovery and Business Continuity Scenario:

Part 1:

You are the IT lead for a small IT company in Florida that sells computers. The company just received one of the most massive orders from a high school on a government base to ship 500 desktop computers located in VA. A natural disaster occurred (hurricane) has left your location without power; however, you do have cellular service, "most of the roads are not travelable." Due to the power outage in your area, the U.S. postal service and others will not be delivering. The CEO needs this transaction to occur as this could lead to a long-lasting relationship and will keep the company above water.

What procedures would you take to fulfill the order?

Create a short guide to keep business going if the power is disrupted again in the future due to a hurricane.

Part 2:

The power has been restored, and hackers are attempting to take advantage of the opportunity and crisis, therefore, using Kali Linux (Metasploit) to gain access to company servers. Your company has a Windows-based server, which Windows is prone to attacks. You assume that your company is maybe next in a Ransomware attack as other IT companies are falling victim within your local area.

What steps will you take to ensure that you do not become a victim of ransomware?

Guide Information:

Must be in APA

Each question does not have a page length requirement, and you will be graded on creativity and the solution quality. In hindsight papers that are longer than 3 pages usually have better creativity and detailed solutions. This assignment is based on your ability to solve a problem that may be a continuous issue.

Reference no: EM132358116

Questions Cloud

Demonstrate connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Network attacks and countermeasures : Discuss and explain Network Attacks and Countermeasures.
Penetration intrusive attack : Write a short essay (2/3 pages) And define and describe what are the following Penetration Intrusive Attacks?
Discuss your recommend for disaster recovery plan : Discuss your recommend for disaster recovery plan for a university. Please make sure your recommendations are based on recommended disaster recovery platforms
Disrupted again in the future due to hurricane : Disaster Recovery and Business Continuity Scenario. Create short guide to keep business going if the power is disrupted again in the future due to a hurricane.
Data scientist to design plan : A Health Organization has contacted you as a Data Scientist to design a plan on how to improve its data privacy
Midwest family mutual goes green case study : This is the Midwest Family Mutual Goes Green case study. Managing and Using Information Systems: A Strategic Approach,
What are the pros and cons of having risk officers : What are the pros and cons of having risk officers as part-time assignments within different functions and business units?
Describe gaps in current laws or regulations : Describe gaps in current laws or regulations as identified in the literature. Choose an area of information systems research as we've discussed during course.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the dc value of the output voltage

The input to an envelope detector is an ergodic bandpass Gaussian noise process. The RMS value of the input is 2 V and the mean value is 0 V. The envelope detector has a voltage gain of 10.

  The query output to only in-active members

Modify the query to limit the query output to only in-active members, and then run the query. Convert the query to a make table query. Name the new table In-Active Members, and then run the query. Open the In-Active Members table and observe t..

  Binary work and then shift the bits

If you encode the signed integer -5 into an 8 bit binary work and then shift the bits to the right by two places; and wrap the bits (that fall off on the right) around to the left side of the word what value would you get?

  International strategies can be applied to save consumers

Discuss how international strategies can be applied to save consumers' money but keep them contented, based on the quality of product they are buying or using. For example, look at the Flying High with Low Fares article and discuss why or why not ..

  Calculate the cross elasticity with respect to apples

As a result, the market demand increases from 5000 pounds to 8000 pounds. Calculate the cross elasticity with respect to apples.

  What is the total password population

A phonetic password generator picks two segments randomly for each six-letter password. the form of each segment is consonant, voul, consonant, where V= and C= (V)

  Discuss how automated cybersecurity tools

1. Prevent, Detect, and Respond to Cyber Attacks Discuss how automated cybersecurity tools can support operations personnel as they attempt to prevent, detect, and respond to cyber-attacks against a company's networks and information systems.

  Create a program that demonstrates the different types

Create a program that demonstrates the following different types of C# variable scope: Class-Level, Method-Level, and Nested. Post your code in the discussion.

  Determines if a circle and a square intersect

However, as illustrated by Figure 13.13, the x and y ranges might overlap without the circle actually intersecting the square. Write a function that accurately determines if a circle and a square intersect.

  Add and write a new product in product list (file)

The remaining thing like product price, quantity, tax, and discount automatically added in customer invoice from actual product list when customer final bill is generated.

  Determine present worth-future worth of soldering machine

The initial cost is in week 0 and the payments are in years 1-4. Determine the present worth, future worth, and annual worth for.

  Describe the scope and analyze how to control the scope

Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd