You are the enterprise administrator in your organisation. You are responsible for all systems including servers, clients, databases, equipment and mobile devices. Your ultimate goals are to ensure that the network infrastructure is highly available and secured. You have been alerted that a staff member, Employee A, has deleted and corrupted numerous files on the system that would have contributed in providing evidence in a scheduled disciplinary hearing against Employee A. The files deleted have an impact on the business continuity, audit trails and data integrity. The corrupted files have caused some of the systems to stop working. Your goal is that you want to conduct a quantitative risk calculation focusing on the likelihood of the risk. Discuss any two quantitative tools that could help you achieve your goal.

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter14: System Administration
Section: Chapter Questions
Problem 2RP
icon
Related questions
Question
100%

You are the enterprise administrator in your organisation. You are
responsible for all systems including servers, clients, databases,
equipment and mobile devices. Your ultimate goals are to ensure that
the network infrastructure is highly available and secured. You have been
alerted that a staff member, Employee A, has deleted and corrupted
numerous files on the system that would have contributed in providing
evidence in a scheduled disciplinary hearing against Employee A. The files
deleted have an impact on the business continuity, audit trails and data
integrity.

The corrupted files have caused some of the systems to stop working. Your
goal is that you want to conduct a quantitative risk calculation focusing on
the likelihood of the risk.


Discuss any two quantitative tools that could help you achieve your goal.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning