COMPUTER THREATS SECURITY
COMPUTER SECURITY POLICIES EXAMPLES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
to prevent staff installing software
|
|
To set security parameters
|
|
To identify what to do if sales fall drastically low
|
|
To set out how an organisation will respond to a variety of different types of disaster
|
Detailed explanation-1: -Disaster recovery (DR) is an organization’s ability to respond to and recover from an event that negatively affects business operations. The goal of DR methods is to enable the organization to regain use of critical systems and IT infrastructure as soon as possible after a disaster occurs.
Detailed explanation-2: -The objective of a disaster recovery (DR) plan is to ensure that an organization can respond to a disaster or other emergency that affects information systems – and minimize the effect on business operations.
Detailed explanation-3: -Disaster recovery plans allow organizations to ensure they meet all compliance requirements, while also providing a clear roadmap to recovery. Some types of disasters that organizations can plan for include: Application failure. Communication failure (Internet or power outage, etc)
Detailed explanation-4: -A disaster recovery team is the group in an organization tasked to develop, document, and execute processes and procedures for data recovery, business continuity, and IT infrastructure repairs in case of an attack or failure. Think of it as a race car’s pit crew that ensures it will run efficiently throughout a race.
Detailed explanation-5: -What are five major elements of a typical disaster recovery plan? A disaster recovery plan should address various levels of response to a number of possible disasters and should provide for partial or complete recovery of all data, application software, network components, and physical facilities.