SlideShare a Scribd company logo
Discuss the challenges of maintaining information security at a
remote recovery location.
DQ requirement:
Note that the requirement is to post your initial response no
later than Sunday and you must post one additional post during
the week. I recommend your initial posting to be between 200-
to-300 words. The replies to fellow students and to the
professor should range between 100-to-150 words. All initial
posts must contain a properly formatted in-text citation and
scholarly reference.
Reply 1:
Information security at a remote recovery location
Recovery is the act or preparation to overcome the man made or
natural disaster.Information Security plays a vital role to
overcome the disaster. Even though Information security is
important there are lots of challenges in maintaining
information security at remote recovery location. In case if
information security is not maintained properly then there may
chance of vulnerabilities like harmful instruction will delivered.
Some other challenges include observing insights, implementing
procedures, controlling remote site and making the site aware
about the risk. It is difficult to monitor the entire resources
towards the center of information security. And also gaining
control and implementing process took some time at the remote
recovery location. Some of the Major Challenges of maintaining
information security are
1) Although remote locations often operate as independent
small businesses, there is a constant requirement for sensitive
information such as corporate resources, customerrecords, and
payment data to be shared between the corporate headquarters
and each site. Dangers of sending sensitive communication over
the open web present significant security risks. Distributed
enterprise organizations need a way to secure all
communications between their corporate HQ and remote
employee and business locations.
The Possible solution to this challenge is :
Establishing an encrypted network connection, known as a
Virtual Private Network (VPN), between the HQ and the remote
location, or between two remote locations willensure that all
communications are secure.
2) Credit cards have been a convenience to businesses and
consumers alike for over 50 years. These small pieces of plastic
make transacting easy, but securing those transactions in our
connected world is a different story entirely. Purpose-built
malware is popping up every day, designed specifically to
compromise point of sale (POS) systems.For the Distributed
Enterprise, cash-only is simply not an option. Organizations
must accept and transmit customer payment information, which
creates a unique set of security challenges for both the remote
site and the corporate HQ.
The possible solution to this challenge is :
Remote locations that process credit card transactions
must utilize best-in-class network security technologies to not
only protect and monitor their payment systems, but toalso
separate the network used for payment transactions from the
rest of their network and all other information systems. Also, as
the target of many dedicated attacks, organizations must employ
solutions for protecting their POS systems from advanced and
zero day malware threats. Sophisticated UTM appliances can
offer Distributed Enterprises all of the advanced network
protection they need from one easy-to-deploy offering.
3) In recent years, regulatory bodies have been tasked with
establishing data security standards and requirements,which are
designed to protect both businesses and consumers from theft,
fraud, and other damages. Although these compliance standards
are valuable, they can generate serious challenges for IT
professionals. Security systems need regular updates to
correspond with the ever-evolving compliance standards. In
addition, data storage and transmission systems need to be
constantly monitored for unauthorized usage and access.
Organizations that fail to comply with PCI DSS, HIPAA, and
other global standards, are subject to enforcement actions and
fines.
The possible solution to this challenge is :
Businesses within the retail, health care, and hospitality
markets are especially sensitive to regulatory
compliance.Related aspects of PCI DSS, HIPAA, and other
major regulatory compliance standards can be achieved
leveraging UTM security appliances as they enable
segmentation of network traffic and secure transfer of sensitive
information between sites. Modern network visibility tools offer
the ability to set alerts and automated reports on security events
that are relevant to the compliance standard,including data-
leakage, malware, and unauthorized user access. Maintaining
clear visibility for auditing purposes is also a requirement for
maintaining compliance.
4) Wireless Internet access is becoming an increasingly common
service offered to customers, guests, and patients.Distributed
Enterprises that choose to offer guest Wi-Fi must be aware of
the associated liability. Users can often jump from the guest
network to the corporate network,giving them access to
sensitive employee and customer data. Businesses also assume
liability for any copyright infringement that results from guests
illegally downloadingcontent such as media. Organizations must
balance the need for tight security, while at the same time
providing a fast and seamless Wi-Fi experience for their
customers, especially as the number of connected devices
continues to grow.
The possible solution to this problem is :
Organizations that choose to offer Wi-Fi hotspots must
implement technologies and processes that adhere to data
security standards, including PCI DSS and HIPAA. Wi-Fi
performance is a large influencer of customer satisfaction, so all
security technologies must offer line speed performance during
times of peak usage. Both firewall and wireless access point
technologies must allow for network segmentation, which
separates guests from sensitive corporate data. Full UTM, Data
Loss Prevention and Advanced Malware protection are essential
in protecting the wireless network from targeted and evolving
threats
Reply 2:
Maintaining security at a recovery location
In the event of an incident, it is important to consider issues of
cross-site contamination. Failing over to a recovery location is
not going to work in the event that the recovery site is also
infected with Ransomware. This is something to consider if you
have a hybrid or warm site. Pulling full snapshots of your
environment will bring everything including the intrusions with
it (Livens, 2018).
If your recovery location is in the cloud, you need to consider
that the cloud-based threats now apply to your recovery site.
Contractual issues, chain of custody issues, lack of
administrative controls and others like next-door neighbor
issues. Other could tenants may be under attack which may
impact your operational capacity (Atchison, 2018)
Transportation. Moving large volumes of data to a recovery
location loud or other in a controlled and secure manner can be
hard to maintain as the size of your data grows.
Physical security. Changes in full physical access to the
hardware at your recovery site could cause issues. Even in a
site owned by the organization recovery sites should maintain
restricted physical and network administration until activated as
the primary.
Hardware life cycle management. Even your recovery
environment needs to be updated, patched, performance-tested,
and eventually decommissioned.
General Maintenance. Changes to your main production
environment, size, capacity, configuration, patches, and even
access control lists (ACL)s need to be considered and updates to
the recovery environment need to be made. Your organization
may make changes to your internet capacity but forget about
updating the internet bandwidth at the recovery site.

More Related Content

Similar to Discuss the challenges of maintaining information security at a remo.docx

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
IOSR Journals
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
Cisco Service Provider Mobility
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
IT-Toolkits.org
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
Intronis MSP Solutions by Barracuda
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
manoharparakh
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
isidro luna beltran
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
lorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
jesusamckone
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
InfinityGroup5
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
infra-si
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
Legal Services National Technology Assistance Project (LSNTAP)
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
IAEME Publication
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Enterprise Insider
 

Similar to Discuss the challenges of maintaining information security at a remo.docx (20)

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 

More from standfordabbot

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docx
standfordabbot
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docx
standfordabbot
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
standfordabbot
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docx
standfordabbot
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docx
standfordabbot
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docx
standfordabbot
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docx
standfordabbot
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docx
standfordabbot
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docx
standfordabbot
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docx
standfordabbot
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docx
standfordabbot
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docx
standfordabbot
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docx
standfordabbot
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docx
standfordabbot
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docx
standfordabbot
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docx
standfordabbot
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docx
standfordabbot
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docx
standfordabbot
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docx
standfordabbot
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docx
standfordabbot
 

More from standfordabbot (20)

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docx
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docx
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docx
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docx
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docx
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docx
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docx
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docx
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docx
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docx
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docx
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docx
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docx
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docx
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docx
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docx
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docx
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docx
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docx
 

Recently uploaded

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 

Recently uploaded (20)

Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 

Discuss the challenges of maintaining information security at a remo.docx

  • 1. Discuss the challenges of maintaining information security at a remote recovery location. DQ requirement: Note that the requirement is to post your initial response no later than Sunday and you must post one additional post during the week. I recommend your initial posting to be between 200- to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference. Reply 1: Information security at a remote recovery location Recovery is the act or preparation to overcome the man made or natural disaster.Information Security plays a vital role to overcome the disaster. Even though Information security is important there are lots of challenges in maintaining information security at remote recovery location. In case if information security is not maintained properly then there may chance of vulnerabilities like harmful instruction will delivered. Some other challenges include observing insights, implementing procedures, controlling remote site and making the site aware about the risk. It is difficult to monitor the entire resources towards the center of information security. And also gaining control and implementing process took some time at the remote recovery location. Some of the Major Challenges of maintaining information security are 1) Although remote locations often operate as independent small businesses, there is a constant requirement for sensitive
  • 2. information such as corporate resources, customerrecords, and payment data to be shared between the corporate headquarters and each site. Dangers of sending sensitive communication over the open web present significant security risks. Distributed enterprise organizations need a way to secure all communications between their corporate HQ and remote employee and business locations. The Possible solution to this challenge is : Establishing an encrypted network connection, known as a Virtual Private Network (VPN), between the HQ and the remote location, or between two remote locations willensure that all communications are secure. 2) Credit cards have been a convenience to businesses and consumers alike for over 50 years. These small pieces of plastic make transacting easy, but securing those transactions in our connected world is a different story entirely. Purpose-built malware is popping up every day, designed specifically to compromise point of sale (POS) systems.For the Distributed Enterprise, cash-only is simply not an option. Organizations must accept and transmit customer payment information, which creates a unique set of security challenges for both the remote site and the corporate HQ. The possible solution to this challenge is : Remote locations that process credit card transactions must utilize best-in-class network security technologies to not only protect and monitor their payment systems, but toalso separate the network used for payment transactions from the rest of their network and all other information systems. Also, as the target of many dedicated attacks, organizations must employ solutions for protecting their POS systems from advanced and
  • 3. zero day malware threats. Sophisticated UTM appliances can offer Distributed Enterprises all of the advanced network protection they need from one easy-to-deploy offering. 3) In recent years, regulatory bodies have been tasked with establishing data security standards and requirements,which are designed to protect both businesses and consumers from theft, fraud, and other damages. Although these compliance standards are valuable, they can generate serious challenges for IT professionals. Security systems need regular updates to correspond with the ever-evolving compliance standards. In addition, data storage and transmission systems need to be constantly monitored for unauthorized usage and access. Organizations that fail to comply with PCI DSS, HIPAA, and other global standards, are subject to enforcement actions and fines. The possible solution to this challenge is : Businesses within the retail, health care, and hospitality markets are especially sensitive to regulatory compliance.Related aspects of PCI DSS, HIPAA, and other major regulatory compliance standards can be achieved leveraging UTM security appliances as they enable segmentation of network traffic and secure transfer of sensitive information between sites. Modern network visibility tools offer the ability to set alerts and automated reports on security events that are relevant to the compliance standard,including data- leakage, malware, and unauthorized user access. Maintaining clear visibility for auditing purposes is also a requirement for maintaining compliance. 4) Wireless Internet access is becoming an increasingly common service offered to customers, guests, and patients.Distributed Enterprises that choose to offer guest Wi-Fi must be aware of the associated liability. Users can often jump from the guest
  • 4. network to the corporate network,giving them access to sensitive employee and customer data. Businesses also assume liability for any copyright infringement that results from guests illegally downloadingcontent such as media. Organizations must balance the need for tight security, while at the same time providing a fast and seamless Wi-Fi experience for their customers, especially as the number of connected devices continues to grow. The possible solution to this problem is : Organizations that choose to offer Wi-Fi hotspots must implement technologies and processes that adhere to data security standards, including PCI DSS and HIPAA. Wi-Fi performance is a large influencer of customer satisfaction, so all security technologies must offer line speed performance during times of peak usage. Both firewall and wireless access point technologies must allow for network segmentation, which separates guests from sensitive corporate data. Full UTM, Data Loss Prevention and Advanced Malware protection are essential in protecting the wireless network from targeted and evolving threats Reply 2: Maintaining security at a recovery location In the event of an incident, it is important to consider issues of cross-site contamination. Failing over to a recovery location is not going to work in the event that the recovery site is also infected with Ransomware. This is something to consider if you have a hybrid or warm site. Pulling full snapshots of your environment will bring everything including the intrusions with it (Livens, 2018).
  • 5. If your recovery location is in the cloud, you need to consider that the cloud-based threats now apply to your recovery site. Contractual issues, chain of custody issues, lack of administrative controls and others like next-door neighbor issues. Other could tenants may be under attack which may impact your operational capacity (Atchison, 2018) Transportation. Moving large volumes of data to a recovery location loud or other in a controlled and secure manner can be hard to maintain as the size of your data grows. Physical security. Changes in full physical access to the hardware at your recovery site could cause issues. Even in a site owned by the organization recovery sites should maintain restricted physical and network administration until activated as the primary. Hardware life cycle management. Even your recovery environment needs to be updated, patched, performance-tested, and eventually decommissioned. General Maintenance. Changes to your main production environment, size, capacity, configuration, patches, and even access control lists (ACL)s need to be considered and updates to the recovery environment need to be made. Your organization may make changes to your internet capacity but forget about updating the internet bandwidth at the recovery site.