Question

In: Operations Management

Problem: Stored data is one of a company’s most valuable assets. If that data were to...

Problem: Stored data is one of a company’s most valuable assets. If that data were to be stolen, lost, or compromised so that it could not be accessed, the company could go out of business. Therefore, companies go to great lengths to protect their data.

1.) Working with classmates, research how the companies where you each work handle their backups. If you are unable to determine this information from the company where you work, contact another local company for information.

2.) Find out how each company protects its data against malware, unauthorized access, and even natural disasters, such as fire and floods. Prepare a brief report that describes the companies’ procedures. In your report, point out any areas where you find a company has not protected its data adequately.

Solutions

Expert Solution

The local company protects its data from malware, cyber attack, and unauthorized access and from natural disasters by implementing these tools, techniques and strategies. First it put a control to access computers. Certain employees are authorized to access stored information to prevent misuse of data. For this purpose, the company uses passwords, electronic keys, and biometrics scan. The company also uses application security by encrypting the data, and by using white box security system. The company also uses antivirus programs, and firewall system to protect data from hackers. Moreover, it also uses behavioral analytics to find out abnormal activities. Employees are instructed to not send confidential and sensitive information from outside network. For email security, strong password creation is encouraged and enforced by the company. Further, the company uses an intrusion prevention system to avoid malicious attacks. As far as keeping the data safe from natural calamities is concerned, the company stores data in two places and moves data to cloud environment.

The company needs to consider insider attack threats that it does not focus. For this purpose, digital trails collection must be obtained by the company to ensure that insider attack will not take place.


Related Solutions

1. SQL is considered one of the most valuable skills to empower managers as data analysts....
1. SQL is considered one of the most valuable skills to empower managers as data analysts. Search the Web for free resources that teach SQL. Try a free introductory lesson (you might find these in sites like Khan Academy, and Code Academy, among others). Is this something you might continue to explore on your own? Does your university offer classes where you can learn SQL and other methods and technologies used in data analytics? 2. Name and define the terms...
REQUIRED: 1. We have discussed employees are the most valuable assets of an organization, even though...
REQUIRED: 1. We have discussed employees are the most valuable assets of an organization, even though they are not listed in the Balance Sheet. Without employees, an organization is nothing. Explain the main reasons why employees are valuable assets, and why the organization should treat them well? 2. Describe what employees expect from the organization and why? 3. How should an organization treat its employees during a pandemic? – Discuss from both organization and employees’ perspectives. Discuss how the pandemic...
Big Data comes from a wide range of sources. The most valuable sources for marketers are...
Big Data comes from a wide range of sources. The most valuable sources for marketers are those that capture data on both potential and current customers to yield actionable insights Knowledge of the different types of data available within Big Data sources can enable marketing managers to identify means of answering questions of both strategic and tactical importance. The ability to gather insights from Big Data begins with knowing what are some of the right data sources for use in...
Task 2 (1 mark) Transformation of data stored in the relational tables into data stored in...
Task 2 (1 mark) Transformation of data stored in the relational tables into data stored in BSON collection.
Make a Risk Management Plan for your Valuable IT Assets at Home . a. Identify Assets...
Make a Risk Management Plan for your Valuable IT Assets at Home . a. Identify Assets and their Value, Classify, Prioritize them b. Identify Threats and Priorities c. Specify Asset Vulnerabilities d. Calculate Risk (show all calculations) e. Select Control Strategies for Mitigating, Treating and Reducing Risk You would be submitting following documents as outcomes of your activity. Each document has 5 marks. a. Information Asset Classification Worksheet b. Weighted Factor Analysis Worksheet c. TVA Spreadsheet d. Ranked Vulnerability Risk...
In April 1997, Bre-X Minerals, a Canadian company, was supposedly one of the most valuable companies...
In April 1997, Bre-X Minerals, a Canadian company, was supposedly one of the most valuable companies in the world. Bre-X had convinced numerous mining experts that they had rights to one of the largest gold deposits ever discovered. It was hailed as the mining find of the century. The gold mine, located on a remote island in the East Kalimantan Province of Indonesia, supposedly had so much gold that the actual price of gold on the open market dropped significantly...
In April 1997, Bre-X Minerals, a Canadian company, was supposedly one of the most valuable companies...
In April 1997, Bre-X Minerals, a Canadian company, was supposedly one of the most valuable companies in the world. Bre-X had convinced numerous mining experts that they had rights to one of the largest gold deposits ever discovered. It was hailed as the mining find of the century. The gold mine, located on a remote island in the East Kalimantan Province of Indonesia, supposedly had so much gold that the actual price of gold on the open market dropped significantly...
The “fictitious commodity” is one of Karl Polanyi’s most valuable theoretical concepts. Consider two items you...
The “fictitious commodity” is one of Karl Polanyi’s most valuable theoretical concepts. Consider two items you can buy at a super market: a bag of sugar and a Halloween costume. One of these items is a “fictitious commodity” and the other is not. Please explain which is which and why.
Why is applied research is the most valuable to healthcare administration?
Why is applied research is the most valuable to healthcare administration?
On 1 January 2019, the total assets of the Dexter Company were $270 million. The company’s...
On 1 January 2019, the total assets of the Dexter Company were $270 million. The company’s present capital structure, which follows, is considered to be optimal. Assume that there is no short-term debt. Long-term debt $ 135,000,000 Ordinary equity $135,000,000 Total liabilities and Equity $270,000,000 The company is considering an investment in a new capital investment project. Assuming that all asset expansion (gross expenditures for fixed assets plus related working capital) is included in the capital budget, the dollar amount...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT