logo

Challenges to Maintain Information Security at Remote Recovery Locations

   

Added on  2023-06-13

4 Pages612 Words107 Views
Running head: CHALLENGES TO MAINTAIN IS AT REMOTE LOCATIONS
Challenges to Maintain IS At Remote Locations
Name of the Student:
Name of the University:
Author note

1CHALLENGES TO MAINTAIN IS AT REMOTE LOCATIONS
Introduction
The data held by the organizations are of vast significance and needs proper security
for its maintenance. Information security is the process of safeguarding the both the digital
and physical information unauthorized access. The paper discusses the challenges
encountered in the maintenance of information security at remote recovery locations.
Challenges of maintaining information security at remote recovery location
The maintenance of Information security is of utmost importance to the respective
firms as the conditions of data breaches can lead to huge financial as well as reputational loss.
The situation possesses the capability to affect the firm adversely. There are numerous
changes faced by the organizations in the maintenance of the Information Security at the
remote locations. Some of the challenges include insufficient network or system design for
compliance and auditing technique, threat of various types of attacks, lack of safety
awareness or security measurements, tremendous growth of the company beyond the network
design and non maintenance of the security patches (Alcaraz & Zeadally, 2015). The
insufficient network design and lack of auditing technique enables the hackers to easily
access the data leading to security breaches. The network security design addresses the
business issues such that the disruption is minimal. Moreover, various types of attacks such
as denial of service and masquerading may also hamper the data making recovery of the
original data difficult (Furdek et al., 2016). Thus, hampers the disaster recovery techniques.
In addition to these, the lack of security awareness also hampers the disaster recovery
mechanism.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Threats in Cloud Computing
|4
|668
|210

Chevron's Infrastructure Evaluation
|5
|701
|328

Cloud Computing: Advantages, Disadvantages, and Implementation
|8
|342
|321

ITC568 - Webb’s Stores Cloud Security Assignment
|9
|1868
|309

Embedding Cyber Resilience Principles for Board
|16
|2997
|436

IT Network Designing Task 2022
|20
|2611
|34