Discussion Questions
1.)
Search “scholar.google.com” for a company or school that has reported issues, problems, concerns about their backup procedures. Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups?
2.)
Search “scholar.google.com” or your textbook. Discuss the technical skills required to have a CSIRT response team consisting of employees with other job duties (i.e., not a full-time CSIRT job category)? Why or why not? What factors will influence their decision?
3.)
Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?
Note:
Need minimum 800 words for each question.
Avoid plagiarism and content should be in APA format (mandatory)
Provide minimum 2 references for each question and those references must include at end of each and every answer accordingly.
Solution Preview
Question 1
Most people focus on protecting data, but they do not give much attention to backing up relevant data. The use of antivirus and firewalls can protect data. However, back up, data is also very vulnerable. There are various approaches which are used to ensure that back up information is always secure (Mladen, 2008). The most common method is that of 3-2-1 step. In this approach, someone is supposed to have three copies of the data which is backed up. These data should not be a similar format but slightly different.
(2,652 words)