StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Providing Reliable Security Services to the Company - Essay Example

Cite this document
Summary
The author of the following paper "Providing Reliable Security Services to the Company" argues in a well-organized manner that the development of a disaster recovery plan can help the company recover important data and files in case of any mishap. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Providing Reliable Security Services to the Company
Read Text Preview

Extract of sample "Providing Reliable Security Services to the Company"

All issues related to data security need to be addressed in disaster recovery plans to provide considerable security to the data stored in the computers. A disaster recovery plan includes such modules and applications which save data in case of failures. A disaster recovery plan assesses all aspects of data and puts proper procedures in place to make the data as secure as possible.

I have sent the proposal regarding creating, testing and maintaining a proper disaster recovery plan to ensure data safety. Although it will take some time and money to create and implement an effective disaster recovery plan, the benefits associated with the implementation of the plan will overshadow the costs.

Nothing is more important to an IT-based company than data security because every function of an IT company needs analysis of data. Therefore, the implementation of a disaster recovery plan will be very beneficial for the company as it will not only make the data secure but also will prevent disruption to the computing environment.

I have also proposed the use of intrusion detection software to the company to prevent unauthorized access to sensitive data. Installation of such a system will not be costly; rather it will provide a strong mechanism to deal with the issues of data stealing and unauthorized access. Some of the main benefits of installing such a system include defense against data stealing, prevention of network hacking, continuous network monitoring, update of firewall settings, and many other benefits. Therefore, both of my proposals should be accepted because they will ensure data security for the company.

Phase: 3

Hot Sites

A hot site is part of a disaster recovery service using which a company can continue its activities in case of a disaster. Benefits of hot sites include availability and convenience for the customers whereas disadvantages include cost and complexity (Moore, 2011).

Cold Sites

            A cold site is also a part of a disaster recovery service but using these, customers need to install necessary equipment to perform data-related activities in case of a disaster. Advantages include low cost as compared to hot sites whereas disadvantages include limited availability and longer recovery timescales (Moore, 2011).

Warm Sites and Timeshare Sites

A warm site is the most common type of disaster recovery service in which standby becomes available within hours. Timeshare sites provide limited availability to users in case of disasters.

Fault Tolerance vs. Disaster Recovery

            “Fault tolerance is a design that ensures a computer application will remain functioning in the event of catastrophic failure” (Holmes, n.d.). Fault tolerance includes hardware, software, and network safety measures, which continue their operations in the event of failures. Fault tolerance measures are used to secure critical applications whereas disaster recovery systems ensure data safety. Power fault tolerance provides more than one power inlet to the computers to ensure continuity in computer operations. Hardware fault tolerance makes one of the applications remain functional in case a piece of equipment faces mechanical failure. Backup power plans make use of generators and large batteries to preserve computer systems.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discussion Board Essay Example | Topics and Well Written Essays - 500 words - 4”, n.d.)
Discussion Board Essay Example | Topics and Well Written Essays - 500 words - 4. Retrieved from https://studentshare.org/information-technology/1578713-discussion-board
(Discussion Board Essay Example | Topics and Well Written Essays - 500 Words - 4)
Discussion Board Essay Example | Topics and Well Written Essays - 500 Words - 4. https://studentshare.org/information-technology/1578713-discussion-board.
“Discussion Board Essay Example | Topics and Well Written Essays - 500 Words - 4”, n.d. https://studentshare.org/information-technology/1578713-discussion-board.
  • Cited: 0 times

CHECK THESE SAMPLES OF Providing Reliable Security Services to the Company

Online Payments Assurance and Security

The main objective of the study is to identify how the companies can enhance their security measures so that the consumers feel safe in making payments online.... The main objective of the study is to identify how the companies can enhance their security measures so that...
24 Pages (6000 words) Term Paper

Managed Service Provider

Managed service providers use the concept of cloud computing to provide reliable and cost-effective services to client companies.... The needs may range from network monitoring and remote data back to the creation of Voice over Internet Protocol services and Virtual Private Networks.... chauland (2011) states, 'Cloud computing is used to allow services used in everyday practice to be moved onto the Internet rather than stored on a local computer'....
4 Pages (1000 words) Research Paper

Security in the Cloud

It is a network-based environment providing reliable information technology services to users via the internet.... Concepts Related to Cloud Computing Cloud computing is defined as the management and provision of applications, information, software, and resources as services over the cloud-based on-demand (Singh and Shrivastava, 2012).... It provides services and resources based on demand across the internet.... This literature review "security in the Cloud" presents security in the cloud; it will focus on the issue of security as regards the concept of cloud computing....
9 Pages (2250 words) Literature review

Huffman Trucking Company Inc. Telephony Service Profiling

Limitation of the subscription is only for internal or within the company premises use.... At present, Huffman Trucking company Inc.... In a telephone company, one has to pay separate for these features, but with PBX everything is already built in.... If we go on a recording voice first for the identification of local trunk lines, we tend to test the patience of our callers and of our best customers who would want trucking services that are literally fast movers in every sense of the word....
14 Pages (3500 words) Essay

Cloud Computing

From the customers perspective the very idea that company data is in the hands of a third party is in itself a security concern as this is a “relationship” based on trust (MSV, 1/1/2012).... Therefore any company willing to invest on a cloud based system has to engage in proper research and also create contingency measures and fall back systems.... Their use of Amazon Web services grants them access to a robust public cloud server system that....
2 Pages (500 words) Case Study

Comparing Public Security Sector and Private Security Sector

rivate-sector security involves the services offered by private organizations or individuals to provide personal security to individuals' homes, apartments and businesses.... The nature and responsibilities of private security firms are to provide personalized security and include special operation services where and when required.... The paper "Comparing Public security Sector and Private security Sector" focuses on the critical analysis of the major issues on comparison and contrast between public security sector and private security sector....
12 Pages (3000 words) Research Paper

Principles of Information Security

Overview of the company is a key section of the report that provides adequate information about the existing information system of the hospital, its information needs and the need for functional information policies to guide the utilization of the system.... This paper 'Principles of information security' analyzes the state of an information system in a company before proposing various issue-specific policies capable of enhancing the efficiency and effectiveness of the system....
9 Pages (2250 words) Essay

Cloud Computing and Three Service Types

The paper "Cloud Computing and Three Service Types" explains highlights how the company can feasibly make use the cloud services, and outlines the potential benefits and dangers of using cloud services as well as the role explains the benefits and issues of open source licenses.... This report is intended for the board of Business and explains the concept and service models of cloud computing, highlights how the company can feasibly make use of the cloud services and outlines the potential benefits and dangers of using cloud services as well as the role explain the benefits and issues of open source licenses....
14 Pages (3500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us