Business Continuity and Disaster Recovery Analysis Report

Verified

Added on  2020/04/21

|3
|411
|80
Report
AI Summary
This report provides an analysis of business continuity and disaster recovery strategies. It begins by addressing a hypothetical scenario where a company experiences a network intrusion, leading to the compromise of sensitive customer data. The report then outlines specific measures implemented to mitigate such threats, including application controls to manage network resources and prevent unauthorized access. Furthermore, the report discusses the implementation of strict password and management policies to prevent unauthorized access to the network. It also covers the use of authentication protocols, such as IPsec, to secure network communications, and the filtering of inbound and outbound traffic to enhance security. The report concludes by emphasizing the importance of these measures in fortifying the network against future attacks and ensuring data protection. The report also includes references to relevant academic sources that support the information provided.
Document Page
Running head: BUSINESS CONTINUITY 1
Business Continuity and Disaster Recovery
Name:
Institution Affiliation:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
BUSINESS CONTINUITY 2
Yes, my Company has been targeted of the network intrusion. The attacker were able to
penetrate through the network through a phishing method and they were able to target the
customer information especially their social security number and the credit card number (Al-
Jarrah & Arafat, 2014). These individuals were successful to compromise this information and
steal the client’s information. Nonetheless, the organization have been able to the following
changes in order to ensure such vulnerability are controlled and do not occur in the future. One
way was through application controls which were established. This observes the application
which are in use particularly to the web-based applications well as the services and apply to the
security policy so as they could block or even starve the unwanted or perhaps unauthorized
application from the consuming the resource network (Kenkre, Pai & Colaco, 2015). The
organization has also implemented on the strict password as well as the management policies and
practices. They have been able to implement this so as to prevent the attacker from gaining
access to the network privileges (Kenkre, Pai & Colaco, 2015). The organization uses
authentication which is based on the key exchange between the machines on the network such as
IPsec which would help significantly cut down. The organization has also implemented on the
filtering of the inbound as well as the outbound traffic.
The organization has implemented on this changes which has enabled it to ensure there is
security in the network, and in case there is any future attacks they will not be able to attack on
the system.
Document Page
BUSINESS CONTINUITY 3
References
Al-Jarrah, O., & Arafat, A. (2014, April). Network Intrusion Detection System using attack
behavior classification. In Information and Communication Systems (ICICS), 2014 5th
International Conference on (pp. 1-6). IEEE.
Kenkre, P. S., Pai, A., & Colaco, L. (2015). Real time intrusion detection and prevention system.
In Proceedings of the 3rd International Conference on Frontiers of Intelligent
Computing: Theory and Applications (FICTA) 2014 (pp. 405-411). Springer, Cham.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]