Reference no: EM131533513
Read the two (2) articles:
Arduini, F., & Morabito, V. (2010, March). Business continuity and the banking industry. Communications of the ACM, 53(3), 121-125
Dahbur, K., & Mohammad, B. (2011). The anti-forensics challenge. Proceedings from ISWSA '11: International Conference on Intelligent Semantic Web-Services and Applications. Amman, Jordan.
Write a five to six (5-6) page paper in which you:
1. Consider that Data Security and Policy Assurance methods are important to the overall success of IT and Corporate data security.
a. Determine how defined roles of technology, people, and processes are necessary to ensure resource allocation for business continuity.
b. Explain how computer security policies and data retention policies help maintain user expectations of levels of business continuity that could be achieved.
c. Determine how acceptable use policies, remote access policies, and email policies could help minimize any anti-forensics efforts. Give an example with your response.
2. Suggest at least two (2) models that could be used to ensure business continuity and ensure the integrity of corporate forensic efforts. Describe how these could be implemented.
3. Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery and analysis plan could assist in improving the Recovery Time Objective (RTO) as described in the first article.
4. Provide a step-by-step process that could be used to develop and sustain an enterprise continuity process.
5. Describe the role of incident response teams and how these accommodate business continuity.
6. There are several awareness and training efforts that could be adopted in order to prevent anti-forensic efforts.
a. Suggest two (2) awareness and training efforts that could assist in preventing anti-forensic efforts.
b. Determine how having a knowledgeable workforce could provide a greater level of secure behavior. Provide a rationale with your response.
c. Outline the steps that could be performed to ensure continuous effectiveness.
7. Use at least three (3) quality resources in this assignment.
|
Two sets of performance data
: How do you find the appropriate t-test statistic if you are only given two sets of performance data (1st month and 6th month) the N and nothing else?
|
|
Suggest two methods that apple can utilize to ensure
: Suggest two methods that Apple can utilize to ensure that its suppliers adhere to wage and benefits standards going forward. Justify your response.
|
|
What do you believe auditing standards are mainly concerned
: Erica Gray, CPA, is a sole practitioner. She has been practicing as an auditor for 10 years. Recently a long-standing audit client asked Gray to design.
|
|
Complements and conditional probability
: A homeowner finds that there is a 0.15 probability that a flashlight does not work when turned on.
|
|
Explain the essentials of defining digital forensics process
: Explain the essentials of defining a digital forensics process and provide two (2) examples on how a forensic recovery assist in improving
|
|
Explain the advantages of verification techniques
: Your friend, Wendy Geiger, owns a small retail store that sells candies and nuts. Geiger acquires her goods from a few select vendors.
|
|
Compare two industries you have identified in terms of size
: Compare and contrast the two industries you have identified in terms of size, products, services, customers, economic and regulatory environment.
|
|
What might we do to attenuate the problems she describes
: Sherry Turkle raises concerns about our new dependence on mobile devices, including the fact that "We're lonely, but we're afraid of intimacy."
|
|
Compute seasonal indices for quarter based on cma
: A). Compute seasonal indices for each quarter based on a CMA. B). Deseasonalize the data and develop a trend line on the deseasonalize data.
|