Cloud Computing – Define and describe disaster recovery

Cloud Computing

In paragraph form, define and describe disaster recovery.  Define and describe business continuity.  Discuss the threats posed by disgruntled employees and how to mitigate those threats. Identify and cite a real-world example of an organization put at risk by a disgruntled employee. 

300 words in  APA 7th edition style (including headings, in-text citations, and references). Please refer to the Publication Manual of the American Psychological Association (2020). 

Case Analysis 1 – Innovation in India

Case Analysis 1 – Innovation in India: The chotukool Project (40 pts)

Please answer the following questions:

  1. What were the pros and cons of attempting to develop a refrigerator for India’s rural poor?
  2. What product and process innovations did the chotuKool entail? Would you consider these incremental or radical? Architectural or component? Competence enhancing or competence destroying?
  3. Did the chotuKool pose a threat of disrupting the traditional refrigerator market? Why or why not?
  4. Is there anything you think Godrej should have done differently to penetrate the market of rural poor families in India?
  5. What other products might the lessons Godrej learned with chotuKool apply to?

5. Importantly, apply as many of the COs (Course Objectives) as you can to the case. These are given for reference below.

Your case length needs to be at least  2 1/2 – 3 pages (approximately 600 – 750 words), double spaced, have at least three references using APA format (you may use one or two references cited from the case but you should have at least one additional unique reference from your own research) , and typed in an easy-to-read font (Times New Roman 12 font recommended) in MS Word (no pdfs or rtfs or non standard formats). Please include a cover sheet with your full name, the case name, our course number (NETW583), and the date you submit.

Submit your assignment.

Course Objectives:

CO A – Given a company situation be able to describe the industry dynamics of technological innovation.

CO B – Given a company situation be able to determine whether and how to protect its technological innovations.

CO C – Given an organizational and industry context, identify the core technological competencies of the organization

CO D – Given an organizational context, develop a plan to increase the innovative capabilities of the organization both through collaboration strategies and internal innovation.

CO E – Given information about a company’s industry, and organization, formulate a technological innovation strategy through its new product development strategy.

CO F – Given an organizational and industry context, identify and suggest a deployment strategy that will facilitate the success of a technologically driven organization.

Rubrics:

  • Content: Accuracy of information and demonstrates an understanding of the case and questions presented.  20 PTS
  • Language and Format:  Language, as presented, is professional and grammatically free of errors.  10 PTS 
  • Length & References: Length requirements are met (at least  2 1/2 – 3 pages / approximately 600 – 750 words. Have at least three references using APA format (you may use one or two references cited from the case, but you should have at least one additional unique reference from your own research) 10 PTS 

Assignment TCO and DR- need to prepare a backup plan

Assignment TCO and DR- need to prepare a backup plan for disasters in your company’s LAN network. Please refer to the document uploaded for questions/instruction and sample templates.

Backup and Disaster Plan

( Figure 1 ) Facts:

· Your company has a small LAN (Local area network)

· Your company is a small web-based catalog sales company.

· Customers order products.

· The customer order is transmitted to the business partner.

· The customer’s payment is processed.

· The payment for the order is transmitted to the business partner with your fee deducted.

· The business partner ships the product.

· There are two servers in the data center.

· Server 1 is houses email and a small database.

· Server 2 is for domain authentication, file-sharing.

· There are two routers that manage the network traffic between the two switches.

· One router is dedicated to Internet inbound/outbound.

· The other router is dedicated to managing data to/from other sources

Backup

1. What would you backup?

2. How often would you execute backups?

 

Possible outages

1. What could fail and how will it impact the business.

2. What is your plan to continue operations during each scenario?

Replication

1. What would it cost to install a new server for replication?

2. Assume the servers are medium to small (open to your imagination)

3. Present a table that shows all the factors in the TCO (total cost of ownership).

a. HINTS: Some things to consider are: purchase cost, install cost, software licensing costs, labor, maintenance.

Submission:

Search the Internet for a template and put your results into that form.

Here are a few possibilities.

https://nhchc.org/wp-content/uploads/2019/08/health-center-template-small-1.doc

https://www.in.gov/health/files/PREPARE_Disaster_Plan_Template_IN_8_08.pdf

https://www.disasterrecoveryplantemplate.org/wp-content/uploads/DisasterRecoveryPlanTemplate.org-Disaster-Response-Plan.docx

 

Network Monitoring And Security Control

Network Monitoring And Security Control

Overview

There are several lines of defense available to network and security administrators, including intrusion prevention and detection technologies. The activities and tools that are available to monitor and test the security levels on a modern network are varied. They range from free open source to very expensive and sophisticated technologies. They come in single-use solutions and best-of-breed solutions, which are typically suites of network management applications that perform a variety of activities.

 

In this assignment you explain various monitoring tools and methods available to network administrators.

Write 3–4 pages in which you consider the following aspects of network monitoring.

  • Choose a common packet inspection tool and explain how it works to mitigate threats.
  • Describe three criteria that a network or security administrator might use when selecting a network monitoring tool.
  • Describe a security policy that is designed to ensure that an organization’s information is not compromised by internal IT staff.

Insider Security Threats – While threats to the confidentiality

Insider Security Threats

While threats to the confidentiality, integrity, and availability of data may originate from many types of attackers, the information security threats from trusted insiders—such as employees, vendors, and contractors—can be particularly insidious because the attackers have legitimate credentials on enterprise systems and networks. Insider threats may be difficult to detect because it can be challenging to differentiate between potentially harmful actions and an employee’s authorized work.

Share a relevant story—ideally based on your personal or professional experiences—about how a security incident originated with an attack vector that was opened, either maliciously or accidentally, by a trusted insider. Focus your discussion on the features that make this particular insider attack unique by describing the salient features of the attack, when and how the breach incident was discovered, the data that was illegally accessed, and the short- and long-term consequences of the attack to the organization.