Preview

Briargrove

Satisfactory Essays
Open Document
Open Document
403 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Briargrove
Briargrove, a multinational organization, has a wide-range of computer systems and applications of which need to communicate with each other quite frequently. However, being that different backup systems are located globally and online, Briargrove only implemented data back-ups and lab test network without having any particular policy or procedure put into place. The impact of not implementing administrative controls is that, a vast amount of management has taken it upon themselves to download unknown software of which has counteracted with the system therefore causing a complete system failure and thereby affecting the organization as a whole entity. Subsequently, after the system failure, Briargrove has been advised to provide both a …show more content…
With the systems essentially having no downtime, Briargrove has scheduled their servers to back up every six hours (12am, 6am, 12pm, 6pm Central Standard Time) with other backup systems throughout globally just in case one of the systems does not potentially back up. When the failure accorded, it not only affected the organizations desktop stations, but it also greatly impacted the organizations laptops as well. Immediately after the issues were reported to the appropriate management, it was quite obvious that S.M.A.R.T.E.R goal needed to be implemented throughout the organization. Being that the greatest impact to any system failure is to not have a system backup, luckily Briargrove did not have to be exposed to this type of loss because of the backups that were previously mention in other locations from server to server. From this incident, one take-away that Briargrove was able to have is that regardless of the program that is utilized, it is detrimental for an organization to have a backup offsite in the case of a natural

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The network diagram of Global Finance, Inc. (GFI) depicts the layout of the company’s mission critical systems. The company has two servers (Email and the Oracle database) which are used more than any of their other systems. GFI heavily depend on their network to be stable because of their financial systems that are running and any outage would negatively affect their operations and financial situation. Like all other business, customer satisfaction and the security of GFI’s network is crucial. In order to ensure their network and data is secure, GFI has begun to re-evaluate their network infrastructure. GFI has had some service interruptions that has cost them over $100,000 in revenue losses.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * If they have redundant servers then down time will be minimal depending on configuration, minutes. If all servers lose their data then recover time may exceed hours. There is no paper trail to recover non-backed up data as all information is online.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    Read the following case description of an IT crisis and answer the questions posed at the end of the description.…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    Operational issues are the issues arising in the process of how something is done; these are the 4 types of operational issues Organizations have to store and manage countless pieces of information. These are very important and confidential Information. Information is received by the businesses mainly in two ways.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Equipment failure-no backup’s setup. This is another vulnerability that can be avoided by performing regular backups and keeping them at an offsite location.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 3110 Lab 7

    • 949 Words
    • 4 Pages

    Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan. But, we need to locate disaster recovery risk assessment and business impact assessment in the overall planning process. To do that, let us remind ourselves of the overall goals of disaster recovery planning, which are to provide strategies and procedures that can help return IT operations to an acceptable level of performance as quickly as possible following a disruptive event. The speed at which IT assets can be returned to normal or near-normal performance will impact how quickly the organization can return to business as usual or an acceptable interim state of operations.…

    • 949 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The information technology director, Peter Myers, brings a whole new problem to the company. His lack of management skills and unethical decisions has exacerbated the technological problem. Myers’ decision when Jody Antopolis informs him of the backdoor reflects the lack importance he gives to costumer safety and brings out his ignorance towards issues QRR is facing. Although it was a good choice to upgrade the information system, unless it is properly maintained and managed it is prone to fail and be destructive. Myers also has to figure out how to effectively monitor the productivity of the employees in an ethical manner. Employees were previously informed of the QRR computer acceptable use policy, but as reports show employees are using the Internet for recreational purposes lowering the productivity of GRR. Myers must accept problems and work to deal with them or QRR must change their management.…

    • 909 Words
    • 4 Pages
    Good Essays