SlideShare a Scribd company logo
1 of 5
Discuss the challenges of maintaining information security at a
remote recovery location.
DQ requirement:
Note that the requirement is to post your initial response no
later than Sunday and you must post one additional post during
the week. I recommend your initial posting to be between 200-
to-300 words. The replies to fellow students and to the
professor should range between 100-to-150 words. All initial
posts must contain a properly formatted in-text citation and
scholarly reference.
Reply 1:
Information security at a remote recovery location
Recovery is the act or preparation to overcome the man made or
natural disaster.Information Security plays a vital role to
overcome the disaster. Even though Information security is
important there are lots of challenges in maintaining
information security at remote recovery location. In case if
information security is not maintained properly then there may
chance of vulnerabilities like harmful instruction will delivered.
Some other challenges include observing insights, implementing
procedures, controlling remote site and making the site aware
about the risk. It is difficult to monitor the entire resources
towards the center of information security. And also gaining
control and implementing process took some time at the remote
recovery location. Some of the Major Challenges of maintaining
information security are
1) Although remote locations often operate as independent
small businesses, there is a constant requirement for sensitive
information such as corporate resources, customerrecords, and
payment data to be shared between the corporate headquarters
and each site. Dangers of sending sensitive communication over
the open web present significant security risks. Distributed
enterprise organizations need a way to secure all
communications between their corporate HQ and remote
employee and business locations.
The Possible solution to this challenge is :
Establishing an encrypted network connection, known as a
Virtual Private Network (VPN), between the HQ and the remote
location, or between two remote locations willensure that all
communications are secure.
2) Credit cards have been a convenience to businesses and
consumers alike for over 50 years. These small pieces of plastic
make transacting easy, but securing those transactions in our
connected world is a different story entirely. Purpose-built
malware is popping up every day, designed specifically to
compromise point of sale (POS) systems.For the Distributed
Enterprise, cash-only is simply not an option. Organizations
must accept and transmit customer payment information, which
creates a unique set of security challenges for both the remote
site and the corporate HQ.
The possible solution to this challenge is :
Remote locations that process credit card transactions
must utilize best-in-class network security technologies to not
only protect and monitor their payment systems, but toalso
separate the network used for payment transactions from the
rest of their network and all other information systems. Also, as
the target of many dedicated attacks, organizations must employ
solutions for protecting their POS systems from advanced and
zero day malware threats. Sophisticated UTM appliances can
offer Distributed Enterprises all of the advanced network
protection they need from one easy-to-deploy offering.
3) In recent years, regulatory bodies have been tasked with
establishing data security standards and requirements,which are
designed to protect both businesses and consumers from theft,
fraud, and other damages. Although these compliance standards
are valuable, they can generate serious challenges for IT
professionals. Security systems need regular updates to
correspond with the ever-evolving compliance standards. In
addition, data storage and transmission systems need to be
constantly monitored for unauthorized usage and access.
Organizations that fail to comply with PCI DSS, HIPAA, and
other global standards, are subject to enforcement actions and
fines.
The possible solution to this challenge is :
Businesses within the retail, health care, and hospitality
markets are especially sensitive to regulatory
compliance.Related aspects of PCI DSS, HIPAA, and other
major regulatory compliance standards can be achieved
leveraging UTM security appliances as they enable
segmentation of network traffic and secure transfer of sensitive
information between sites. Modern network visibility tools offer
the ability to set alerts and automated reports on security events
that are relevant to the compliance standard,including data-
leakage, malware, and unauthorized user access. Maintaining
clear visibility for auditing purposes is also a requirement for
maintaining compliance.
4) Wireless Internet access is becoming an increasingly common
service offered to customers, guests, and patients.Distributed
Enterprises that choose to offer guest Wi-Fi must be aware of
the associated liability. Users can often jump from the guest
network to the corporate network,giving them access to
sensitive employee and customer data. Businesses also assume
liability for any copyright infringement that results from guests
illegally downloadingcontent such as media. Organizations must
balance the need for tight security, while at the same time
providing a fast and seamless Wi-Fi experience for their
customers, especially as the number of connected devices
continues to grow.
The possible solution to this problem is :
Organizations that choose to offer Wi-Fi hotspots must
implement technologies and processes that adhere to data
security standards, including PCI DSS and HIPAA. Wi-Fi
performance is a large influencer of customer satisfaction, so all
security technologies must offer line speed performance during
times of peak usage. Both firewall and wireless access point
technologies must allow for network segmentation, which
separates guests from sensitive corporate data. Full UTM, Data
Loss Prevention and Advanced Malware protection are essential
in protecting the wireless network from targeted and evolving
threats
Reply 2:
Maintaining security at a recovery location
In the event of an incident, it is important to consider issues of
cross-site contamination. Failing over to a recovery location is
not going to work in the event that the recovery site is also
infected with Ransomware. This is something to consider if you
have a hybrid or warm site. Pulling full snapshots of your
environment will bring everything including the intrusions with
it (Livens, 2018).
If your recovery location is in the cloud, you need to consider
that the cloud-based threats now apply to your recovery site.
Contractual issues, chain of custody issues, lack of
administrative controls and others like next-door neighbor
issues. Other could tenants may be under attack which may
impact your operational capacity (Atchison, 2018)
Transportation. Moving large volumes of data to a recovery
location loud or other in a controlled and secure manner can be
hard to maintain as the size of your data grows.
Physical security. Changes in full physical access to the
hardware at your recovery site could cause issues. Even in a
site owned by the organization recovery sites should maintain
restricted physical and network administration until activated as
the primary.
Hardware life cycle management. Even your recovery
environment needs to be updated, patched, performance-tested,
and eventually decommissioned.
General Maintenance. Changes to your main production
environment, size, capacity, configuration, patches, and even
access control lists (ACL)s need to be considered and updates to
the recovery environment need to be made. Your organization
may make changes to your internet capacity but forget about
updating the internet bandwidth at the recovery site.

More Related Content

Similar to Discuss the challenges of maintaining information security at a remo.docx

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfmanoharparakh
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxlorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxjesusamckone
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfEnterprise Insider
 

Similar to Discuss the challenges of maintaining information security at a remo.docx (20)

Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Advanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdfAdvanced Approaches to Data Center Security.pdf
Advanced Approaches to Data Center Security.pdf
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 

More from standfordabbot

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxstandfordabbot
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxstandfordabbot
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxstandfordabbot
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxstandfordabbot
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxstandfordabbot
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxstandfordabbot
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxstandfordabbot
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxstandfordabbot
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxstandfordabbot
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxstandfordabbot
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxstandfordabbot
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxstandfordabbot
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxstandfordabbot
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxstandfordabbot
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxstandfordabbot
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxstandfordabbot
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxstandfordabbot
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxstandfordabbot
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxstandfordabbot
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxstandfordabbot
 

More from standfordabbot (20)

Discuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docxDiscuss the evolution of law enforcement in terms of forensic scienc.docx
Discuss the evolution of law enforcement in terms of forensic scienc.docx
 
Discuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docxDiscuss the ethics of medianews reporting matters of national.docx
Discuss the ethics of medianews reporting matters of national.docx
 
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docxDiscuss the ethics of using unconscious nudges to alter peoples beh.docx
Discuss the ethics of using unconscious nudges to alter peoples beh.docx
 
Discuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docxDiscuss the ethical implications of a leaders role in the socia.docx
Discuss the ethical implications of a leaders role in the socia.docx
 
discuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docxdiscuss the differences between Virtualization and Cloud Computi.docx
discuss the differences between Virtualization and Cloud Computi.docx
 
Discuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docxDiscuss the differences between substantive law, procedural law,.docx
Discuss the differences between substantive law, procedural law,.docx
 
Discuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docxDiscuss the differences between the three major approaches surroundi.docx
Discuss the differences between the three major approaches surroundi.docx
 
Discuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docxDiscuss the differences between Unitary and confederal systems of go.docx
Discuss the differences between Unitary and confederal systems of go.docx
 
Discuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docxDiscuss the differences between the systems development life c.docx
Discuss the differences between the systems development life c.docx
 
Discuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docxDiscuss the differences between substantive law, procedural law, c.docx
Discuss the differences between substantive law, procedural law, c.docx
 
Discuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docxDiscuss the differences between communism socialism and capitalism.docx
Discuss the differences between communism socialism and capitalism.docx
 
Discuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docxDiscuss the differences between civil and criminal courts. Is the li.docx
Discuss the differences between civil and criminal courts. Is the li.docx
 
Discuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docxDiscuss the difference between normative economic analysis and posit.docx
Discuss the difference between normative economic analysis and posit.docx
 
Discuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docxDiscuss the difference between external and internal evidence as it .docx
Discuss the difference between external and internal evidence as it .docx
 
Discuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docxDiscuss the difference between an income tax expense and an in.docx
Discuss the difference between an income tax expense and an in.docx
 
Discuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docxDiscuss the development of political and social structures that prod.docx
Discuss the development of political and social structures that prod.docx
 
Discuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docxDiscuss the development of coronary artery disease (CAD) and the lin.docx
Discuss the development of coronary artery disease (CAD) and the lin.docx
 
Discuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docxDiscuss the data visualization in the attached file below (Data Visu.docx
Discuss the data visualization in the attached file below (Data Visu.docx
 
Discuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docxDiscuss the data set and the following topics.How effective .docx
Discuss the data set and the following topics.How effective .docx
 
Discuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docxDiscuss the case study of Ciba-Geigy p.docx
Discuss the case study of Ciba-Geigy p.docx
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

Discuss the challenges of maintaining information security at a remo.docx

  • 1. Discuss the challenges of maintaining information security at a remote recovery location. DQ requirement: Note that the requirement is to post your initial response no later than Sunday and you must post one additional post during the week. I recommend your initial posting to be between 200- to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference. Reply 1: Information security at a remote recovery location Recovery is the act or preparation to overcome the man made or natural disaster.Information Security plays a vital role to overcome the disaster. Even though Information security is important there are lots of challenges in maintaining information security at remote recovery location. In case if information security is not maintained properly then there may chance of vulnerabilities like harmful instruction will delivered. Some other challenges include observing insights, implementing procedures, controlling remote site and making the site aware about the risk. It is difficult to monitor the entire resources towards the center of information security. And also gaining control and implementing process took some time at the remote recovery location. Some of the Major Challenges of maintaining information security are 1) Although remote locations often operate as independent small businesses, there is a constant requirement for sensitive
  • 2. information such as corporate resources, customerrecords, and payment data to be shared between the corporate headquarters and each site. Dangers of sending sensitive communication over the open web present significant security risks. Distributed enterprise organizations need a way to secure all communications between their corporate HQ and remote employee and business locations. The Possible solution to this challenge is : Establishing an encrypted network connection, known as a Virtual Private Network (VPN), between the HQ and the remote location, or between two remote locations willensure that all communications are secure. 2) Credit cards have been a convenience to businesses and consumers alike for over 50 years. These small pieces of plastic make transacting easy, but securing those transactions in our connected world is a different story entirely. Purpose-built malware is popping up every day, designed specifically to compromise point of sale (POS) systems.For the Distributed Enterprise, cash-only is simply not an option. Organizations must accept and transmit customer payment information, which creates a unique set of security challenges for both the remote site and the corporate HQ. The possible solution to this challenge is : Remote locations that process credit card transactions must utilize best-in-class network security technologies to not only protect and monitor their payment systems, but toalso separate the network used for payment transactions from the rest of their network and all other information systems. Also, as the target of many dedicated attacks, organizations must employ solutions for protecting their POS systems from advanced and
  • 3. zero day malware threats. Sophisticated UTM appliances can offer Distributed Enterprises all of the advanced network protection they need from one easy-to-deploy offering. 3) In recent years, regulatory bodies have been tasked with establishing data security standards and requirements,which are designed to protect both businesses and consumers from theft, fraud, and other damages. Although these compliance standards are valuable, they can generate serious challenges for IT professionals. Security systems need regular updates to correspond with the ever-evolving compliance standards. In addition, data storage and transmission systems need to be constantly monitored for unauthorized usage and access. Organizations that fail to comply with PCI DSS, HIPAA, and other global standards, are subject to enforcement actions and fines. The possible solution to this challenge is : Businesses within the retail, health care, and hospitality markets are especially sensitive to regulatory compliance.Related aspects of PCI DSS, HIPAA, and other major regulatory compliance standards can be achieved leveraging UTM security appliances as they enable segmentation of network traffic and secure transfer of sensitive information between sites. Modern network visibility tools offer the ability to set alerts and automated reports on security events that are relevant to the compliance standard,including data- leakage, malware, and unauthorized user access. Maintaining clear visibility for auditing purposes is also a requirement for maintaining compliance. 4) Wireless Internet access is becoming an increasingly common service offered to customers, guests, and patients.Distributed Enterprises that choose to offer guest Wi-Fi must be aware of the associated liability. Users can often jump from the guest
  • 4. network to the corporate network,giving them access to sensitive employee and customer data. Businesses also assume liability for any copyright infringement that results from guests illegally downloadingcontent such as media. Organizations must balance the need for tight security, while at the same time providing a fast and seamless Wi-Fi experience for their customers, especially as the number of connected devices continues to grow. The possible solution to this problem is : Organizations that choose to offer Wi-Fi hotspots must implement technologies and processes that adhere to data security standards, including PCI DSS and HIPAA. Wi-Fi performance is a large influencer of customer satisfaction, so all security technologies must offer line speed performance during times of peak usage. Both firewall and wireless access point technologies must allow for network segmentation, which separates guests from sensitive corporate data. Full UTM, Data Loss Prevention and Advanced Malware protection are essential in protecting the wireless network from targeted and evolving threats Reply 2: Maintaining security at a recovery location In the event of an incident, it is important to consider issues of cross-site contamination. Failing over to a recovery location is not going to work in the event that the recovery site is also infected with Ransomware. This is something to consider if you have a hybrid or warm site. Pulling full snapshots of your environment will bring everything including the intrusions with it (Livens, 2018).
  • 5. If your recovery location is in the cloud, you need to consider that the cloud-based threats now apply to your recovery site. Contractual issues, chain of custody issues, lack of administrative controls and others like next-door neighbor issues. Other could tenants may be under attack which may impact your operational capacity (Atchison, 2018) Transportation. Moving large volumes of data to a recovery location loud or other in a controlled and secure manner can be hard to maintain as the size of your data grows. Physical security. Changes in full physical access to the hardware at your recovery site could cause issues. Even in a site owned by the organization recovery sites should maintain restricted physical and network administration until activated as the primary. Hardware life cycle management. Even your recovery environment needs to be updated, patched, performance-tested, and eventually decommissioned. General Maintenance. Changes to your main production environment, size, capacity, configuration, patches, and even access control lists (ACL)s need to be considered and updates to the recovery environment need to be made. Your organization may make changes to your internet capacity but forget about updating the internet bandwidth at the recovery site.