Accident Over the Last Several Research Paper

Total Length: 681 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

In some cases, you may have to take equipment that has been infected with the virus offline (for maintenance) and use a flash drive to remove it / reprogram the operating system. Once this occurs, you would then connect all of the different security protocols together. The basic idea is to be able to use them, to serve as a backup system in the event that there is some kind of breach. This will give the hackers limited access to: certain areas and it will isolate them to select parts of the company's servers. (Lacey, 2009, pp. 269 -- 310)

The final part of the strategy is to ensure effective monitoring of the various systems. This will take place with the company using an outside security consultant. They will have the responsibility of helping to coordinate mock attacks. This will effectively test the strategy and identify for weaknesses. At the same time, they must train employees what to look out for and the possible warning signs of an early attack.

Stuck Writing Your "Accident Over the Last Several" Research Paper?

This can be accomplished by: having different training modules coordinate with the security consultant. They will help to provide an initial foundation of knowledge. At which point, they can work with employees to adjust to the changing nature of the threat. (Lacey, 2009, pp. 269 -- 310)

If this kind of strategy could be implemented, it will help to mitigate the current risks. Then, the security protocol will address medium term threats by: creating a number of secondary blocks that will protect each other. This will make it more difficult in conducting any kind of cyber attack. To ensure that the company is adapting to new threats, the security consultant will train staff members and test the system for breaches (in the form of a mock attack). Over the course of time, this strategy will reduce the chance of these kinds of incidents and it will make it difficult for hackers to retrieve any kind of sensitive information......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Accident Over The Last Several" (2011, May 23) Retrieved May 2, 2024, from
https://www.aceyourpaper.com/essays/accident-last-several-44929

Latest MLA Format (8th edition)

Copy Reference
"Accident Over The Last Several" 23 May 2011. Web.2 May. 2024. <
https://www.aceyourpaper.com/essays/accident-last-several-44929>

Latest Chicago Format (16th edition)

Copy Reference
"Accident Over The Last Several", 23 May 2011, Accessed.2 May. 2024,
https://www.aceyourpaper.com/essays/accident-last-several-44929