Question: a) Your computing system in your organizations has been infected by a piece of malicious code. Initially, you have no idea when the infection

a) Your computing system in your organizations has been infected by a

a) Your computing system in your organizations has been infected by a piece of malicious code. Initially, you have no idea when the infection occurred. You do have backups performed periodically since the system was put into operation. You have numerous changes to the system over time. ii. As a network administrator, explain how you plan to construct a "normal" version of your computing resources and how different plans have a significantly different impact on your recovery results. (10 marks) Based on your answer above, elaborate the major goals of your disaster recovery plan. (10 marks) b) Your e-commerce platform became the victim of an insider attack. You suspected your employees were responsible to collude and steal transaction records of online customers. Malicious insiders sent customers' data to the hackers who hired them. Customer data have been exposed, including basic contact information and order details. Sensitive personal and financial information was affected by the incident, as the attackers might have access to it. Analyse the scenario above and propose a solution to prevent future data theft? (15 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!