Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

John has been with Dynamic Software for five years. In that time, he has become the go-to person for system backups and computer media for

John has been with Dynamic Software for five years. In that time, he has become the go-to person for system backups and computer media for the critical operating and application software for the company. He manages the computer media library and is responsible for making sure all system backups are completed accurately with at least three generations of backups at any one time. The library has about 700 items, and John is quick on responding to requests for software media or for backup media. John handles the whole operation himself and knows where everything is in the library. If you need something, just call John.

State five security principles or practices based upon the ISC2 Study modules that this operation violates and the possible consequences for the organization.

State five countermeasures that you would employ to improve the security of this operation and how those measures would be effective.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles of Incident Response and Disaster Recovery

Authors: Michael E. Whitman, Herbert J. Mattord, Andrew Green

2nd edition

1111138052, 9781285712628 , 978-1111138059

More Books

Students also viewed these Computer Network questions

Question

What is meant by the authority gap?

Answered: 1 week ago

Question

6.2 Explain the recruitment process.

Answered: 1 week ago