Cloud Computing

    In paragraph form, define and describe disaster recovery. Define and describe business continuity. Discuss the threats posed by disgruntled employees and how to mitigate those threats. Identify and cite a real-world example of an organization put at risk by a disgruntled employee.  

Sample Solution

  Disaster Recovery (DR) is an overarching term that encompasses the processes, protocols and tools used to help organizations respond to and recover from disruptive events natural disasters, cyberattacks, power outages, etc. DR involves establishing plans for IT systems recovery and returning them to a state of operational readiness as quickly as possible following an event or incident.
This preparation may include creating backup copies of data, ensuring staff members have access to necessary applications and systems during a disruption, or making sure any hardware failures are replaced or repaired in the shortest amount of time. DR also includes strategies for identifying vulnerabilities that can be addressed before widespread damage occurs. Business Continuity (BC) is another essential piece of disaster preparedness planning. BC plans define how an organization will continue operations during an event or incident and provide guidelines for restoring normal service levels within predetermined timelines. A BC plan focuses on minimizing downtime by outlining measures such as having different departments relocate workers; providing alternative communication methods; performing backups via cloud storage; securing critical documents; establishing employee roles when needed; utilizing available resources more efficiently; and creating training programs so employees know which steps they need to take if there’s a disruption. One threat posed by disgruntled employees is their potential misuse of sensitive information against their employer's interests via malicious means such as leaking confidential company data or engaging in cyber-espionage activities such as hacking into organizational networks with the intent of stealing intellectual property. To mitigate these risks organizations must develop policies concerning acceptable use of online assets, employ strict user authentication schemes for accessing internal networks, deploy security awareness programs informing staff about proper usage practices related to workplace technology assets, engage external professionals to monitor online activity for signs of unusual behaviour associated with disgruntled employees ,and introduce disciplinary action where appropriate in case incidents occur . A real world example occurred at the Department Of Homeland Security (DHS) where a disgruntled former employee installed malware onto DHS computer systems prior to her termination using her privileged access credentials . The malware was designed specifically target agency databases containing personnel records which exposed millions personal details belonging US citizens who had applied jobs at DHS over five year period . The attack caused considerable reputational harm organisation leading subsequent investigation ultimately finding guilty maliciously installing software code on government computers without authorisation thus resulting imprisonment sentence two years probation fine $5000 USD .

Unlock Your Academic Potential with Our Expert Writers

Embark on a journey of academic success with Legit Writing. Trust us with your first paper and experience the difference of working with world-class writers. Spend less time on essays and more time achieving your goals.

Order Now