Nairobi Business Continuity Planning & Cyber Attack Disaster Recovery Essay Provide a reflection of at least 500 words of how the knowledge, skills, or the

Nairobi Business Continuity Planning & Cyber Attack Disaster Recovery Essay Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have
been applied, or could be applied, in a practical manner to your current work
environment. Also provide a a summary of at least one information security
breach that has occurred in the last three months. If you are not currently
working, share times when you have or could observe these theories and
knowledge could be applied to an employment opportunity in your field of study. Practical Connection Assignment
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills,
or theories of this course have been applied, or could be applied, in a practical manner to your
current work environment. Also provide a a summary of at least one information security breach
that has occurred in the last three months. If you are not currently working, share times when you
have or could observe these theories and knowledge could be applied to an employment
opportunity in your field of study.
Requirements:
Use of proper APA formatting and citations
You should NOT, provide an overview of the assignments assigned in the course. The assignment
asks that you reflect how the knowledge and skills obtained through meeting course objectives
were applied or could be applied in the workplace.
We studied In class: 1) Does your company (or school) have a current disaster recovery plan?
What are some of the activities involved in it?
2) Discuss the issue of securing backups. There have been several incidents lately in which
backup media containing personal customer information were lost or stolen. How should
backup media be secured? What about off-site storage of backups?
3) Review the attached article called “Is your incident response plan ready?”. What was the
first and most important step that the article discusses in planning for a breach? Remember
this is different from the step to respond to an incident. What is important about this
particular step in the process?
4) How would you build a CSIRT? What are the components to building an effective team?
5) Read the Opening Case Scenario called Viral Vandal.
6) The business impact analysis (BIA) has a unique relationship with the disaster recovery
plan. Describe what this relationship means to you.
7) You may have noticed the emphasis on preparedness in this chapter. While society expects
a business to be prepared for disasters and to recover using its own resources, we do not
seem to expect individuals to be prepared to survive a disaster. Should we expect government
at any level to be responsible for disaster recovery at either the personal or business level?
Why or why not? What sacrifices would a business have to make if the disaster recovery
process were turned over to a government agency?

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
Nairobi Business Continuity Planning & Cyber Attack Disaster Recovery Essay Provide a reflection of at least 500 words of how the knowledge, skills, or the
Just from $13/Page
Order Essay
superadmin

Recent Posts

Consider the following information, and answer the question below. China and England are internation

Consider the following information, and answer the question below. China and England are international trade…

4 years ago

The CPA is involved in many aspects of accounting and business. Let’s discuss some other tasks, othe

The CPA is involved in many aspects of accounting and business. Let's discuss some other…

4 years ago

For your initial post, share your earliest memory of a laser. Compare and contrast your first percep

For your initial post, share your earliest memory of a laser. Compare and contrast your…

4 years ago

2. The Ajax Co. just decided to save $1,500 a month for the next five years as a safety net for rece

2. The Ajax Co. just decided to save $1,500 a month for the next five…

4 years ago

How to make an insertion sort to sort an array of c strings using the following algorithm: * beg, *

How to make an insertion sort to sort an array of c strings using the…

4 years ago

Assume the following Keynesian income-expenditure two-sector model:

Assume the following Keynesian income-expenditure two-sector model:                                                AD = Cp + Ip                                                Cp = Co…

4 years ago