Identify three commercially available technology solutions

Assignment Help Computer Network Security
Reference no: EM131299341

Cybersecurity DR / BCP Presentation & Briefing Memorandum

The focus of this assignment should be DR / BCP technology solutions for response and recovery after a cyber security incident of sufficient duration and impact to require activation of the organization's Disaster Recovery and/or Business Continuity Plan.

You may focus upon the incident reported upon in your cybersecurity research paper OR you may take a more general approach.

Suggested technology solutions include:

· General DR/BCP Services

o Palindrome https://www.youtube.com/watch?v=d60m6hUpgvs

· Data Backup Solutions

o Acronis https://www.acronis.com/solutions/smallbusiness/

· Cloud Computing (Infrastructure as a Service, Software as a Service, Platform as a Service)

o VMWare https://www.vmware.com/solutions/datacenter/business-continuity/disaster-recovery.html
o NetApp https://www.netapp.com/us/solutions/data-protection/business-continuity.aspx

· Mobile Data Centers / Mobile Workspace Solutions

o https://www.youtube.com/watch?v=0XCR7aG1Wvc (Sunguard)
o https://www.youtube.com/watch?v=G1oo9y4w1ZY (US Corps of Engineers)

· Emergency Communications Centers / Crisis Management Command Centers
· Cyber forensics and incident response services

o https://www.drivesaversdatarecovery.com/recovery-services/forensics/
o https://www.lwgconsulting.com/
o https://www.boozallen.com/consulting/transform-technology/cyber-technologies/eDiscovery

· Cyber incident analytics services

o https://www.youtube.com/watch?v=yXnVqKaCr9g
o https://www.boozallen.com/consulting/delivering-results-that-endure/cyber/50146704/cyber-incident-response

1. Discuss the importance of disaster recovery and/or business continuity planning with respect to maintaining the confidentiality, integrity, and availability of information and information systems.

2. Identify three commercially available technology solutions (products or services) which could be used to address cybersecurity problems specific to DR / BCP.

3. Research and report upon each of the three technology solutions. For each solution include:

a. Vendor (name and Web site)
b. Product Name and Capabilities
c. How this product or service can be used to support DR / BCP including protecting / restoring confidentiality, integrity, and availability of information and information systems.

4. Provide a summary in which you discuss the benefits of incorporating technology-based solutions when planning for recovery and restoral of IT operations.

1. Grammar / Mechanics / Writing Style

a. Professional appearance
b. Proper grammar, punctuation, spelling, etc.
c. Presentation Format (10 - 20 slides)

i. Title Slide
ii. Importance of DR / BCP to cybersecurity
iii. Technology Solutions Overview
iv. 3 to 5 Slides per Product or Service
v. Summary
vi. Sources Attribution / References slide per instructor's guidance

d. Briefing Memorandum Format

i. To / From / Subject / Date Format
ii. Numbered Paragraphs
iii. Single spaced within paragraphs
iv. Provides summary to support presentation slides
v. No more than 3 pages (one page summary preferred)
vi. Sources Attribution / References in memorandum per instructor's guidance

2. Source Attribution / References

a. You must provide appropriate attribution / credit to sources for information used in the presentation and memorandum.
b. APA style guidance does not specifically address presentations and memoranda
c. Your instructor will provide examples of appropriate citation styles for use in business communications, e.g. presentation slides and memoranda.

Reference no: EM131299341

Questions Cloud

Why the count of unemployed people is not a valid measured : Use these facts to explain why the count of unemployed people is not a valid measure of the extent of unemployment.
Identify factors that influence chief executive remuneration : Determine how this information can be used to identify the factors that influence chief executive remuneration - Univariate and bivariate analysis and discussion which looks at the possible determinants of CEO remuneration - Determine how this inform..
Influence of some actors on the world stage : Globalization has increased the influence of some actors on the world stage and decreased the influence of others. Of the five actors listed below, which ones have increased and which ones have decreased? Why? (Actors: states, IGOs, NGOs, MNCs, ne..
Government securities from a commercial bank : Using a required reserve ratio of 10% and assuming that the banks keep no excess reserves, which of the following scenarios produces a larger effect on the money supply?
Identify three commercially available technology solutions : Identify three commercially available technology solutions (products or services) which could be used to address cybersecurity problems specific to DR / BCP.
How did the researchers measure intelligence : The Case Study that opened the chapter is motivated by research conducted in 1991 by Willerman, Schultz, Rutledge, and Bigler. Read about this study in the EESEE story "Brain Size and Intelligence," and use what you have learned in this chapter to..
Determine the noise contribution of i1 and i2 : Determine the noise contribution of I1 and I2 in Figure to the input for minimum and maximum gain settings.- Neglect the on-resistance of the switches, channel-length modulation, and body effect.
Is curve and lm curve in the current period : Explain what effect an increase in the future expected interest rate will have on the IS curve and LM curve in the current period.
Create a vendor database and related reports : Create a vendor database and related reports and queries to capture contact information for potential PC vendors. This information will be used to populate an MS Access database.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Compare and contrast viruses and worms

Compare and contrast viruses, worms

  Describe the legal and ethical issues inherent

Describe the legal and ethical issues inherent in information security

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Describe the purpose of a risk assessment

Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment.

  Several convicted cases of cyberstalking

There are several convicted cases of cyberstalking and Internet fraud/abuse. Misha Glenny, a United Kingdom-based journalist, recently wrote a book on the subject matter appropriately titled Dark Markets

  Provide a historical timeline of homeland security events

Provide a historical timeline of homeland security incidents along with the call for improved preparedness, response and recovery needs that lead to the creation of National Incident Management Systems and the National Response Framework documents..

  How http and smtp figure into organizational security

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP. Tell us more about these services. How do they figure into organizational security? Elaborate with specifics.

  Describe how and why mandatory access control will be used

Describe how and why mandatory access control will be used. Describe how and why role-based access control will be used. How and why privileged and special account access are used?

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  Give opinion of most important ways that believe encryption

Give your opinion of the two most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.

  Article on wireless hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd