IT Assignment help study online:: Contingency planning for federal information system-Telecommunication system
Question??
Contingency planning for federal information system-Telecommunication system
Solution The question frame is::
The critical review of the “Contingency planning for federal information system is described as below:-
This contingency planning describes the measures to recover the information on terms of contingency planning. This refers to interim measures for recovering and managing the information system with proper services and with proper operations. Thus they address proper planning and recommendations for different types of strategies as well as techniques of the system. This includes the information of client as well as server. This also includes the telecommunication services and mainframe systems. This helps in the process of organization to develop the integration into each stage for an effective contingency plan. This also helps to measure the reduction in terms of effects for increase in the system availability and also for the decrease in the costs of the life cycle. Through the effective strategies of recovery, the system ensures about the quick and the effective strategies with respect to the disruption. The contingency plan also includes detailed guidance and procedures of restoring the damaged system with the unique system of security and also with the requirements of recovery etc. Thus they also ensures about the better improvements and effective plans. Thus they regularly deal with the proper enhancements and also deal with the effective strategies of change in an organization. This also includes high amount of system capability as well as other functions and actions for better operating conditions and for the better systems. Through the help of paper, the information system helps in knowing the process of the business with the help of proper strategies and proper business process. This is essential for the success of the business. This is also effective in terms of better operations and better dealings. Thus it is unique for the system and measures. Thus it deals with the effective and the coordinated strategy that involves proper plans and proper information in terms of the disruption. This restores the information systems and also uses the alternate equipment. This recovers the information systems and uses the processing as well as operations. This recovers the information system with respect to the better operations at better locations. There are different types of contingency planning such as the client and the server systems, the telecommunication systems and the mainframe systems as discussed in the above sections.
Managers are responsible for the operations of information system and the officers of information system security relates with the activities of implementation and other maintenance. Thus it is vulnerable for the variety of options and also this carries operational as well as technical controls of the organizational efforts. Effective contingency planning deals with better development in the organization and also this helps in different objectives such as confidentiality, integrity so as availability. This helps the organization to create security access in terms of effective as well as important data and information for better management and for better results so as output; this will continuously focus on better deals and better management with respect to continuous work force and continuous management. This will effectively deal with important goals so there will be no opportunity and chances of threats as well as risks or dangers in the organization.
The organization helps in preparing better plans during the development phase and also helps in ensuring the proper success with respect to the better resources and better efforts. The considerations of contingency also create the data availability, data confidentiality and integrity at both the levels and the contingency solutions deal with proper design and proper implementation. Thus the considerations of contingency planning helps to consider the technical measures that are used for implementation of the strategies successfully. This helps to provide better solutions and also helps in major considerations. (Swanson, 2010)
MICROS System incorporation (MICROS) providing its services in the area of system planning, acquisition, configuration, on-site support and remote, installation, Hardware and software supports, provides range of trainings, update trainings, spare parts services and supplies and also provides range of services to manage hosting services and software supports to manage the customers in effective and efficient manner. MICROS system incorporation manufactures sells and services computer based point of sales (POS) and property management services (PMS) for the global hospitality industry that includes restaurants, hotels, theme parks, stadiums, casinos, institutions, retail sectors.
To run the businesses successfully in competitive market MICROS system incorporation used enterprises information system.
The four aspects of this policy are as follows:-
Security policies: This is the policy that helps in the better architecture. This also is based on the structured and the defined security standards. It has certain important elements such as:-
The policy includes goals, the purpose and the scope and it is maintained by the help of chief security officer. This also is consistent and mandatory for the better goals. This policy might be used in the relevant organization i.e. Micros systems Inc. policies because there is a conflict in the policy and the Micros policy. Thus it referred to the company policy in terms of the ethics or the code of conduct.
The information should be protected against the unauthorized access and there should be proper maintenance between the confidentiality of the information as well as between the other policies. Thus the integrity needs to be measured. The requirements of the business should be based on proper information and proper systems thus there should have proper achievement. There should have high level of performance with respect to the risks identification and also with the proper and correct measures. The awareness needs to be increased with the help of proper training and there should have proper guidance given in the work place. The policy describes that the Micros systems Inc. information security and department helps in the promotion of network and better information system. This will provide effective and important understanding of control of the resources so as this will effectively generate the better success. This will provide better success by the organization in terms of effective control of information risks and other issues in the work place for better outputs and results. This also creates high capabilities of prevention from loss and other technological assets for better prevention of data. Thus, it creates losses and also this misuses the information system for technological assets and other developments. This also deals with the important activities and secures the information and the management system in the organization. Thus it repairs the data backup and creates the high increase in the security related measures. This way, it ensures better confidentiality, greater access and high availability in the organization. This way the organization effectively designs for the minimization and reduces the loss of the sensitive information so as to reduce the damage of the internal systems critically. This creates high availability of physical facility and business availability.
This also helps in the better resources and better employees with respect to the business systems and other networks. This helps the organization to handle the security awareness, to maintain the data and privacy in the organization, to know the effective standards and policies in the work place as well as to manage the security effectively. This also establishes standards in terms of host equipments and also in terms of better potential. Different types of damages and risks that include in the information system are due to the unauthorized access and improper planning. (Micros.com, 2011)
The three information security breaches are as follows:-
Information security is important and might be security breaches focuses on the term known effectively as unauthorized access with respect to the categories of personal information. This discuss about the personal information in terms of unauthorized access and also in terms of disclosure as well as modifications. (Cate, 2008)
For examples:
Sony: The Company suffered from the dozen of data breaches and it was also highly attacked with the compromise of Sony play station, Sony online entertainment and other pictures. The breaches have been occurred in the company after laying off the security personnel in the months of attacks. They faced the ongoing relations with the customers and also the class actions lawsuits were faced by them. Thus the customers of Sony Company was at huge risk with respect to the attackers and also with the stolen password for accessing the accounts on different other sites. This happened in the year 2011.
The other security breach in the year 2011 that has been created is as discussed below:-
In the New Year eve, the city of San Francisco could not get the backup running system for better running systems and for better emergency operations center because there was no one who knew that password. This began in the year 2011 as it creates the biggest security made from headlines and also this creates hacking of the data in terms of shadowy group.
When the executive chairman of RSA announced that it has been hacked and all the information has been stolen that was linked to its authentication token known as SecurId. This was also the greatest trouble and the difficulty for the organization. This created biggest security breach in the year. The RSA costs about 55$ million in the second quarter of the last year and also the APT’s were bursting in the year 2011. More than 10 companies were hit by the customized email that contains the information about viruses and effective anti-malware detection systems. (Cio.in, 2011)
The main target of security breaches especially deals with the larger companies. Smaller companies are less likely to be targeted of attacks but hacking is done according mainly in the large companies. Larger firms are more likely to be in risk and information security breaches attacks the larger companies in a more context manner. (Netbenefit.com, 2012)
Sony admitted the huge data and information breach. They also suffered the major data breach with respect to the email addresses as well as passwords.
Surprisingly yes, Yahoo that is a very big company facing major security breaches. In this, many data bases are not properly maintained and secured properly that is creating the major issues. According to the research and reports, the website of the hacker Company claims that there is high penetration of services and other important attacks. This also deals with unidentified services and it is a very bad news for Yahoo because the company is suffering huge problems with the security management and also this deal with the parameters that avoids the damages. The bad news of the company is it includes firms such as yahoo that increasingly collects lot of information and also presents major data and information about the big business. They are positioned themselves in the big business with the bigger responsibilities. (Robles, 2012)
Small companies do not mean the security is also less in these types of companies because one when invests in technology, it hires the knowledgeable staffs and also deals with the niche market. It focuses on smaller size but does not mean that small companies need to be protected for less than the larger companies or big companies. Security is important in the same way when describing about the large companies, medium companies or small companies because there is only one difference that discusses that small security breach is like an incident and it has major impact in both the other business such as the small and the big business. Companies of all sizes suffer from the attacks that result from the security breach or any losses or data theft or any other information. This creates high focus on security practices and also this reduces the chance of being successful. (Cawthray, 2012)
If you want IT Management Assignment Help study samples to help you write professional custom essay’s and essay writing help.
Receive assured help from our talented and expert writers! Did you buy assignment and assignment writing services from our experts in a very affordable price.
To get more information, please contact us or visit www.myassignmenthelp.Com