Preview

NETWORKING ADMIN

Good Essays
Open Document
Open Document
606 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NETWORKING ADMIN
Instructions:
Match each description to its plan by writing the description's number in the appropriate blank. Some descriptions may apply to two or more plans.

Plans:
Business continuity plan (BCP) 2, 9, and 10
Disaster recovery plan (DRP) 1, 3, and 4
Business impact analysis (BIA) 5 and 7
Incident response plan 8

Descriptions:
1. May be part of a BCP or referred to in a BCP (DRP)
2. Covers all functions of a business, including IT systems, facilities, and personnel (BCP)
3. Includes critical business functions (CBFs) (DRP)
4. Details emergency response and activities (DRP)
5. Generally includes interviews, surveys, or meetings to assess environment (BIA)
6. Includes the five Ws—who, what, where, when, and why—and one H—how (CIRT)
7. Includes maximum acceptable outages (MAOs) (BIA)
8. Often specifies hot, warm, and cold sites (Incident Response Plan)
9. Helps an organization continue to operate during and after a disruption (BCP)
10. Generally includes only mission-critical systems (BCP)

tructions:
Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.

Common encryption algorithms and methods:
 Data Encryption Standard (DES)
 Rivest, Shamir, and Adleman (RSA) encryption algorithm
 Triple DES
 Diffie-Hellman key exchange
 International Data Encryption Algorithm (IDEA)
 El Gamal encryption algorithm
 Carlisle Adams and Stafford Taveres (CAST) algorithm
 Elliptic curve cryptography (ECC)
 Blowfish
 Secure Sockets Layer (SSL)
 Advanced Encryption Standard (AES)
 Digital signature

Qualitative Risk Assessment
Single loss expectancy (SLE): Total loss expected from a single incident
Annual rate of occurrence (ARO): Number of times an incident is expected to occur in a year
Annual loss expectancy (ALE): Expected loss for a year ALE = SLE X ARO

Safeguard value: Cost of a safeguard or control

Scenario: Richman Investments

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Robert Jones Unit 8 Discussion: John Motorcycle Parts 8/5/2014 IS3110 Mr. Jackson Risk Assessment Plan Performed for John Motorcycle Parts Co. Risks: 1. Identify risks and problems with security plan 2. 5 things to go wrong without Biz Continuity Plan Disaster Recovery Plan. 3. List five risks to be addressed I. Identification of risks and problems:…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Each plant has an enterprise resource planning server. Its data store centralizes the management each plant’s resource applications (University of Phoenix, 2006). These applications hold vital information of customers, vendors and internal assets which must be secured. Various cryptographic and encryption standards are valuable tools in achieving this goal. Governmental regulatory compliance also asserts demands on data security. The following will evaluate each plant’s data security issues.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Qualitative Risk Assessment Single loss expectancy (SLE) : Total loss expected from a single incident Annual rate of occurrence (ARO): Number of times an incident is expected to occur in a year Annual loss expectancy (ALE): Expected loss for a year…

    • 705 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Produce a report that justifies the need for network managers to undertake routine performance management activities. Please ensure that your justification for these activities relates to reasons of efficiency and how they affect the quality of the service provided.…

    • 935 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. ________ can delete and create application data partitions in a forest. It can also delete, create and manage domains and domain trees in a forest.…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Admin

    • 35326 Words
    • 142 Pages

    STATEWIDE SECTION 8 VOUCHER PROGRAM Section 8 Administrative Plan January 1, 2011 2011 SECTION 8 ADMINISTRATIVE PLAN TABLE OF CONTENTS INTRODUCTION................................................................................................................ Intro-1 Charges Against Section 8 Administrative Fee Reserve ...................................................... Intro-1 Section 1.0 SELECTION AND ADMISSION POLICIES 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 1.14 1.15 1.16 1.17 1.18 1.19 1.20 1.21 1.22 1.23 1.24 1.25 Hiring a Housing Choice Voucher Participant as an Employee of the Local Organization ......................................................................................................... 1-1 Eligibility of Local Administrator’s Employees for Housing Choice Voucher Program Assistance ............................................................................................. 1-1 Preferences ........................................................................................................... 1-2 Opening the Waiting List ...................................................................................... 1-2 Closing the Waiting List ....................................................................................... 1-3 Purging the Waiting List ....................................................................................... 1-3 Removal of Applicants from the Waiting List ...................................................... 1-4 Screening of Applicants ........................................................................................ 1-5 Grounds for Denial of Assistance ......................................................................... 1-6 Confidentiality of Criminal Records..................................................................... 1-9 Notification of Negative Actions…

    • 35326 Words
    • 142 Pages
    Powerful Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    admin

    • 1134 Words
    • 3 Pages

    I already have built the PC from scratch, so was unable to get any picture evidence.…

    • 1134 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The first line of defense for almost every organization is typically the system administrator. This is the person that actively interacts with the company network on a daily basis, and by extension has intimate knowledge of it. So it stands to reason that this person would hopefully be the first to notice any signs of possible compromise would it not? Sadly that is often not the case. Whether it is due to a lack of IT Training, complacency, or laziness is anyone’s guess.…

    • 1839 Words
    • 8 Pages
    Better Essays
  • Good Essays

    admin

    • 406 Words
    • 3 Pages

    Life suddenly changed for Gou when one of his employees, 19-yearold L i Hai, plunged to his death from a fifth-floor window at…

    • 406 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    Based on the following information, assess where and when cryptography is needed within a typical IT infrastructure to be in compliance with policies and laws.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Disaster Recovery Plan

    • 526 Words
    • 3 Pages

    The first assessment of the plan would be to implement a supervised walk-through of the test. By conducting this test it will present any added material regarding any additional processes that may need to be added, adjustments in measures that are not sufficient, and additional pertinent changes. The policy has to be amended to legitimate any issues found during the test. The first test run would be best completed in fractions and when less activity is being completed to lessen interruptions to the inclusive operations of the organization. This is an excellent option to include in The Bloom Design Group disaster recovery plan (DRP).…

    • 526 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Program Admin.

    • 676 Words
    • 3 Pages

    The patient very often is by themselves when diagnosed with an illness. Ultimately it is helpful to have a friend or family present when the diagnosis is given. The Patient doesn’t hear the instructions from the doctor and does not listen to what the prognosis is. This often leaves the patient in the dark and with many questions once they get home. After the diagnosis of cancer is heard by the patient, very little of the remaining conversation is retained. For this reason, it is easier to have a friend or family member there not only to listen to what the doctor is saying, but to also be there for consoling the patient. Whether it is to just listen or to talk it through on the ride home, the patient needs someone there to help them deal with the news on their health.…

    • 676 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3x56 = 186 bits a triple encryption with two keys maybe used.…

    • 875 Words
    • 4 Pages
    Satisfactory Essays