SlideShare a Scribd company logo
1 of 1
1) Describe some ways that an organization can recover it's IT
resources from a disaster. What controls should have been in
place in order to be able to retrieve this data.
2) Keystroke logging, often referred to
as keylogging or keyboard capturing, is the action of recording
(logging) the keys struck on a keyboard, typically covertly, so
that the person using the keyboard is unaware that their actions
are being monitored. Explain a situation where using
a keyloggers may be used in either a legitimate (legal) way or
used as a tool for criminals
3) Locate an article on a system breach (Target stores, Sony
Pictures, US Government, and many more).In 2-3 paragraphs,
briefly explain the situation and what kind of information was
compromised. How large was the breach and how long did it
take to find the problem. Include a link to any of your Internet
resources.

More Related Content

Similar to 1)  Describe some ways that an organization can recover its IT reso.docx

Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
smile790243
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
annrodgerson
 
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
hacksoni
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
*****Dominic A Ienco
 
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
LyndonPelletier761
 

Similar to 1)  Describe some ways that an organization can recover its IT reso.docx (20)

A01450131
A01450131A01450131
A01450131
 
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
IT SYSTEMS , CONTROLS , CAATS AND FLOWCHARTS
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.com
 
Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases Compromising Systems: Implementing Hacking Phases
Compromising Systems: Implementing Hacking Phases
 
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASESCOMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
COMPROMISING SYSTEMS: IMPLEMENTING HACKING PHASES
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.com
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.com
 
Chapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdfChapter 1 - Introduction.pdf
Chapter 1 - Introduction.pdf
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com  Ajs 524 Extraordinary Success/newtonhelp.com
Ajs 524 Extraordinary Success/newtonhelp.com
 
cyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometricscyberlaws and cyberforensics,biometrics
cyberlaws and cyberforensics,biometrics
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
1.8 Exercises1. Distinguish between vulnerability, threat, and con.docx
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 

More from karisariddell

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
karisariddell
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx
karisariddell
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx
karisariddell
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx
karisariddell
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docx
karisariddell
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
karisariddell
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
karisariddell
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docx
karisariddell
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx
karisariddell
 

More from karisariddell (20)

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
 
1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx
 
1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx
 
1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx
 
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
 
1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx
 
1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx
 
1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docx
 
1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx
 
1. Which of the following changes will result in a shift of the agg.docx
1.  Which of the following changes will result in a shift of the agg.docx1.  Which of the following changes will result in a shift of the agg.docx
1. Which of the following changes will result in a shift of the agg.docx
 
1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
 
1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docx
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
nhezmainit1
 

Recently uploaded (20)

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
PS-Policies-on-Enrolment-Transfer-of-Docs-Checking-of-School-Forms-and-SF10-a...
 

1)  Describe some ways that an organization can recover its IT reso.docx

  • 1. 1) Describe some ways that an organization can recover it's IT resources from a disaster. What controls should have been in place in order to be able to retrieve this data. 2) Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals 3) Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources.