Discussion

 

In 250 words or more, describe your company’s disaster recovery (DR) plan. Please include a copy of the original approved DR document if the company’s policy allows. Please make sure not to include any confidential documents. Obtain the document(s) and answer the following. Include references and citations when/if applicable:

  1. What is the standard recovery time for the mission critical systems you identified in the previous week discussion?
  2. Where does the company store its back-up data?

crime scenario

you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Cloud Computing

 

After reading the article this week, please answer the following two questions.

  • What are some of the potential risks involved with cloud computing?
  • Does the research and model in this article propose a viable solution to cloud-based risk management?

Post should be 300-350 words

Data Communications

Please write the research paper on topic ” Windows Server Dynamic Access Controls”. find the abstract of the topic and continue the research paper according to the Abstract provided.

week 10

 

This week’s journal articles focus on empowering leadership and  effective collaboration in geographically dispersed teams, please answer  the following questions:

How do geographically dispersed teams collaborate effectively?

Please find at least three tools on the market that teams can use to  collaborate on a geographically dispersed team. Please note the pros  and cons of each tool. 

Based on the research above, note which tool you would select if you were managing the geographically dispersed team and why. 

 

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover  page, an introduction, a body with fully developed content, and a  conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to  transition thoughts. Don’t forget that the grade also includes the  quality of writing.

 

https://doi.org/10.1111/peps.12108

http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=eue&AN=112508299&site=eds-live&custid=s8501869&groupid=main&profile=eds_new

Infrastucture and Security

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
  • Document (MS Word).
  • Microsoft Visio Plan (MS Visio).
Section 1

Write a 3–4 page deliverable in which you:

  • Explain the major cyber governance issues in an organization, and examine how organizations develop communication protocols because of those issues.
  • Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  • Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2