CYB_320_Project_One_SteppingStoneThree_Emily_Brooks

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

320

Subject

Business

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by emilyr.1497

Report
CYB 320 Professor William Spettmann Emily Brooks 3/31/2024 Project One Stepping Stone Three Scenario One: A. First, I would replace the Universal Power Supply that was used as a battery backup for the switches and routers. I would recommend the Universal Power Supply and router be connected exactly as it was previously to ensure continuity. I would then physically configure the Universal Power Supply and routers and make sure the software is reconfigured to match the previous setup. Configuring the firewall would be my next step to ensure the safety of the network once everything was back running properly. Configuring router tables to their previous state will ensure continuity as well. Once the setup completely matches the previous setup, we can then restore everything from the cloud. B. The company already backs up everything to the cloud once a week, however to one way to improve this strategy is backing up the everything to the cloud every day. Also having each user create their own cloud storage would act as a double storage and decrease the risk of data loss.
C. The company should reevaluate their policies and implement new ones to minimize factors that lead to similar incidents in the future. I would recommend training for the employees be more frequent because new people are hired often and the more people hear or see it the more likely they will remember what to do in such an event. Employees should be given a list of things to check because leaving such as checking the integrity of the systems and ensuring all security protocols are being followed. The IT department should reevaluate procedures and protocols every three months to ensure no changes need to be made. Lastly a backup Universal Power Supply should be stored safely somewhere but with easy access in case of an event such as this. Scenario two: A. Because the computer must be wiped and rebuilt, I would check the network and devices connected to the computer for any malware, viruses, or any data that might have been tampered with. I would implement training for all employees using this incident as an example so that the same incident does not occur in the future. I would make sure the file that got corrupted was completely removed so that the user may restore their data from the cloud on their new device. The excel file would have to be a loss so the security of the network would not be compromised. B. I would update the security training for the employees and make sure they know how to prevent this from happening, the steps to take if it does happen again, and how to spot a corrupt file. I would make sure each user had their own cloud back up to decrease the risk of data loss so they can easily restore the data. I would recommend the data to be backed up daily as well.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help