Question

In: Computer Science

Network and Security discussion topics: Business Continuity 1. What are the benefits of creating a disaster...

Network and Security discussion topics: Business Continuity

1. What are the benefits of creating a disaster recovery plan?


2. Why is it important to preserve the chain of custody?

Solutions

Expert Solution

1.

Disaster recovery plan have certain policies or procedures that are ready to recover and and keep the business running in case of calamities occured by both man made or natural.Some of the benefits are as follows

a.Some precautionary measures are taking so that the doesn;t happen

b.Detecting the even which caused the disaster ,

c.Providing the solution for this situtation

There are several steps are followed for the plan to undergo like

analysis,design,implementation,testing acceptance and maintainence

Some stratigies for this plan are

a.To use a system which can produce the data which helps us to access it all the time

b.automatic backup system which backup the data at regular interval of time

c.Replicating data to other offsite locations

2.To maintain the chain of custody,the evidence must be preserved from the time of collecting it till the time it si being presented.to prove the chain of custody the service providers are needed to testify the following

a.the evidence whic is provided is same as that which is collected

b.the time and date when the evidence is received

c.also there is no tampering with the provided evidence

So to maintain the chain of custody for eveidence it is being tested so that it gives the positive results.


Related Solutions

Define and describe disaster recovery and business continuity. Consider and evaluate a business with which you...
Define and describe disaster recovery and business continuity. Consider and evaluate a business with which you are familiar. Discuss potential threats to the business operations and describe ways you would mitigate such risks.
Discuss network security in a business ethics.
Discuss network security in a business ethics.
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
Discussion Topics: Please answer both topics. 1. What are some of the factors that affect the...
Discussion Topics: Please answer both topics. 1. What are some of the factors that affect the way a woman perceives and copes with pain? Discuss culture, age, previous personal experience with pain, parity, and the physical, psychologic, and emotional support. 2. Differentiate among the nursing interventions used for managing specific fetal heart rate patterns, including tachycardia and bradycardia, absent or minimal variability, and late and variable decelerations.
Discussion Topics: Please answer both topics. 1. What are some of the factors that affect the...
Discussion Topics: Please answer both topics. 1. What are some of the factors that affect the way a woman perceives and copes with pain? Discuss culture, age, previous personal experience with pain, parity, and the physical, psychologic, and emotional support. 2. Differentiate among the nursing interventions used for managing specific fetal heart rate patterns, including tachycardia and bradycardia, absent or minimal variability, and late and variable decelerations.
What are three potential benefits of the CCR (Continuity of care record.)
What are three potential benefits of the CCR (Continuity of care record.)
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
My employer has me creating a system and tasked me to select network and access security...
My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.
Focus your discussion on ONE of the following topics: Describe at least 2 benefits and 2...
Focus your discussion on ONE of the following topics: Describe at least 2 benefits and 2 drawbacks there might be for animal cells (including humans) to make their own food through photosynthesis. Explain which cells, tissues, or organs should be modified to lead to successful photosynthesis in animals or humans. Discuss how these compare to a plant's leaves. Describe the process of photosynthesis to explain at least 1 requirement for photosynthesis that would need to be considered for chloroplasts to...
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT