Project #54331 - Information System Security Discussion Questions and Power Point

ANSWER the 8 discussion questions (DQ) in a minimum of 300 words and you MUST include references.  

 

NO PLAGERISM 

 

POWERPOINT PROJECT AT BOTTOM 

 

#1 Answer DQ1 in 300 words or more.  Include references.  

    

What special issues must be considered for corporate data which are not     

fully digitized? What are the risks associated with the loss of these data? 

What recovery procedures do you recommend for these situations? 

 

#2 Respond to classmates answer to DQ1 in 300 words or more and    

  include references:

 

The special issues that I found the must be considered for corporate data that are not fully digitized is that digital preservation raises challenges of a fundamentally different nature which are added to the problems of preserving traditional format materials. By digital preservation, I mean the planning, resource allocation, and application of preservation methods and technologies necessary to ensure that digital information of continuing value remains accessible and usable. Also recording media for digital materials are vulnerable to deterioration and catastrophic loss, and even under ideal conditions they are short lived relative to traditional format materials. Although archivists have been battling acid based papers, thermo fax, nitrate film, and other fragile media for decades, the threat posed by magnetic and optical media is qualitatively different. They are the first reusable media and they can deteriorate rapidly, making the time frame for decisions and actions to prevent loss is a matter of years, not decades. Next is more insidious and challenging than media deterioration is the problem of obsolescence in retrieval and playback technologies. Innovation in the computer hardware, storage, and software industries continues at a rapid pace, usually yielding greater storage and processing capacities at lower cost. Devices, processes, and software for recording and storing information are being replaced with new products and methods on a regular three  to five year cycle, driven primarily by market forces. Records created in digital form in the first instance and those converted retrospectively from paper or microfilm to digital form are equally vulnerable to technological obsolescence. Last is the challenge is the absence of established standards, protocols, and proven methods for preserving digital information. With few exceptions, digital library research has focused on architectures and systems for information organization and retrieval, presentation and visualization, and administration of intellectual property rights.

 

What are the risks associated with the loss of these data?

When it comes to the risk that is associated with the loss of data organizations may face insurmountable financial liabilities if they lose sensitive data. Data breaches can result in direct costs such as reimbursement to customers and data recovery costs. Companies may, for instance, face the inevitable task of recreating lost data from scratch after a breach occurs. Even worse is the damage to one's reputation, especially since most consumers their customers said they would entirely stop dealing with an organization in the event of a security breach.

 

What recovery procedures do you recommend for these situations? 

I would recommend a recovery and a backup plan, because data backup is an insurance plan. Important files are accidentally deleted all the time. Mission critical data can become corrupt. Natural disasters can leave your office in ruin. With a solid backup and recovery plan, you can recover from any of these. Without one, you're left with nothing to fall back on.

 

http://msdn.microsoft.com/en-us/library/bb727010.aspx

 

#3 Respond to classmates answer to DQ1 in 300 words or more and    

  include references:

 

The risks is a measure of a potential loss, material injury, and lack of return on the asset or the investment. Some of the common risk are loss of material, project failure, market risk, lawsuits and risk to sales and revenue. Data loss is also considered a business loss even if monetary value is not assigned to the data. Data protection is indeed a priority for business and keeping data safe at all times. Recovering data that is lost is a major issue especially if you are not aware of the risks associated with trying to recover the data yourself because  you are most likely to do more harm than good.  the is data recovery software that is only useful for recovering recently deleted; files. If the device is malfunctioned due to physical damage or internal malfunctions recovery software will not work. 

Digital preservation raises challenges recording media for digital materials are vulnerable to deterioration and catastrophic loss. Under ideal conditions they are short lived relative to traditional format materials. They are the first reusable media and they can deteriorate rapidly, making the time frame for decisions and actions to prevent loss is a matter of years, not decades. Innovation in the computer hardware, storage, and software industries continues at a rapid pace, usually yielding greater storage and processing capacities at lower cost. Devices, processes, and software for recording and storing information are being replaced with new products and methods regularly. There are exceptions to the digital library research has focused on architectures and systems for information organization and retrieval, presentation and visualization, and administration of intellectual property rights.

 

#4  Respond to classmates answer to DQ1 in 300 words or more and    

  include references:

 

Data that is not fully digitized requires a variety of special considerations when it comes to continuity or planning for recovery. Many organizations still rely heavily on non-digitized information. For these businesses, the loss of this data could have a huge impact on business operations, and non-digitized information should therefore be included in continuity and planning for recovery. Unfortunately, this is an often neglected area of disaster and recovery planning and most businesses do not have enough measures in place to address these issues. If a disaster occur, this hard-copy information would often simply cease to exist.

The reconstruction of non-digitized information is often is generally not possible without outside help or by relying on copies. For example, customer files being destroyed by fire will make it nearly impossible to recover the information from the ashes remaining. Since there is usually no clear record or inventory that exists of all hard-copy paperwork, it is highly unlikely that such information can be restored.

Mitigating these issues and easing recovery is generally difficult. Although digitization of data comes to mind, this can be a very long and costly process, especially depending on the amount and form of hard-copy data. Organizing and promoting possible recovery efforts by establishing inventories and identifying sources that could provide a replacement, for example, can be a much more successful approach providing a high-level of recovery while requiring only reasonable efforts. A combined approach of digitization and enabling is certainly the best solution available. This should include digital copies of all essential information, with recovery protocols and inventory for all other data. Additionally, back-up copies in a third location and fire and water protection will furthermore help minimize risks, as will a proactive approach through evacuation planning and procedures.

 

#5 Answer DQ2 in 300 words or more.  Include references.  

 

What special issues must be addressed for a risk management strategy that supports user-facing, web-based systems? What are the risks associated with disruption of these systems?

 

#6 Respond to classmates answer to DQ2 in 300 words or more and    

  include references:

 

What special issues must be addressed for a risk management strategy that supports user-facing, web-based systems?

Web applications present designers and developers with many challenges. The stateless nature of HTTP means that tracking per user session state becomes the responsibility of the application. As a precursor to this, the application must be able to identify the user by using some form of authentication. Given that all subsequent authorization decisions are based on the user's identity, it is essential that the authentication process is secure and that the session handling mechanism used to track authenticated users is equally well protected. Designing secure authentication and session management mechanisms are just a couple of the issues facing Web application designers and developers. Other challenges occur because input and output data passes over public networks. Preventing parameter manipulation and the disclosure of sensitive data are other top issues.

 

What are the risks associated with disruption of these systems?

The risk that is associated with the disruption of these systems is cost versus the business value of the legacy systems, which according to some industry analyst that the IT budget for operation and maintenance. Monolithic legacy architectures are antitheses to modern distributed and layered architectures. Legacy systems execute business policies and decisions that are hardwired by rigid, predefined process flows, making integration with customer relationship management (CRM) software and Internet based business applications torturous and sometimes impossible. In addition, IT departments find it increasingly difficult to hire developers qualified to work on applications written in languages no longer found in modern technologies. Several options exist for modernizing legacy systems, defined as any monolithic information system that's too difficult and expensive to modify to meet new and constantly changing business requirements. Techniques range from quick fixes such as screen scraping and legacy wrapping to permanent, but more complex, solutions such as automated migration or replacing the system with a packaged product. But rewriting a legacy system from scratch can create a functionally equivalent information system based on modern software techniques and hardware. But the high risk of failure associated with any large software project lessens the chances of success.

 

#7 Answer DQ3 in 300 words or more.  Include references.  

 

Craft an email to your CIO making the case for one of the four risk mitigation strategies (avoid, transfer, mitigate, and keep.) Defend your recommendation.

 

 

#8 Answer DQ4 in 300 words or more.  Include references.  

 

Find a current article about outsourcing and discuss its relevance to power point.  

 

 

PowerPoint

Prepare a 6-10 slide narrated (Notes in presenters notes section) PowerPoint presentation that identifies the possible risks to an organization in each of the following outsourcing situations:

•The use of an external service provider for your data storage.

•The use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking.

•The use of a vendor to support your desktop computers.

•The use of a vendor to provide network support.

 

 

READ BELOW

 

The presentation will include a risk mitigation strategy for each situation. One mitigation strategy, because of personnel and facility limitations, cannot be proposed, because it eliminates the outsourcing by bringing the situation in house.

Subject Computer
Due By (Pacific Time) 01/23/2015 12:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy