Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter B, Problem B4.2MBD

Explanation of Solution

Back up period:

  • A company should choose strategies of back-up and recovery based on goals and operational needs.
  • The period of backup depends on volume of critical information.
  • The period may be hourly, daily or weekly.
  • The most important files should be backed up at least once a day.

Back up storage:

  • The backup should be moved to a secure location on a regular basis.
  • It can be a fireproof cabinet or an offsite storage area.
  • Scheduled backups could be accomplished using backup services or online tools.
  • It can automatically detect and save changed data to back up storage location.

Type of disasters:

  • The types of disasters the company includes:
    • Application failure:
      • It denotes failure of an application.
    • VM failure:
      • It denotes failure of virtual machine.
    • Host failure:
      • It denotes failure of a host machine.
    • Rack failure:
      • It denotes failure of a rack.
    • Communication failure:
      • It denotes failure in network.
    • Data center disaster:
      • It denotes failure in data center.
      • The data storage location may get affected...

Blurred answer
Students have asked these similar questions
Identifying New Computer Viruses and Worms Objective: Examine some current computer virus threats. Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the firewall is. A good place to learn about new threats is the Internet. 1. Start your Webbrowser, and go to www.us-cert.gov. 2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the GObutton. WhatOSsareaffected bythis worm? 3.…
What steps would you take to deal with a mobile virus? Locate any malicious software if it is present. I'd appreciate it if you could lead me through the procedures of removing the virus from your machine. If you are unable to locate information on mobile viruses, you are encouraged to test it for yourself and provide feedback.
What type of virus attacks executable programs?

Chapter B Solutions

Business Driven Technology

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning