research about the following: Mechanisms available for fault tolerance in a syst
ID: 3772951 • Letter: R
Question
research about the following:
Mechanisms available for fault tolerance in a system
Computer crimes and legal implications for employees
Dispute resolution mechanisms when computer crimes occur
Create a section of the report that describes the computer crimes and legal implications for the employees. This should include a point of contact for disputes, the process of appeal, and levels of severity and consequence. This should just be an overview in general terms rather than a complete policy declaration.
Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business. What elements of the business need to be continuous for the business to survive? Justify your answer.
Make sure all prior areas of security for ABC Inc. have been sufficiently addressed along with implementation and verification details. Be sure you have referenced external sources for up-to-date information and comprehensive recommendations. This can include library and Internet research.
Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan.
Expand the section of your report for verifying the implementation of the security recommendations for this week. Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.
Explanation / Answer
Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business.
What elements of the business need to be continuous for the business to survive? Justify your answer.
A major way to implement fault tolerance is Decomposition i.e. splitting a problem into a set of new subproblems. In this way, a problem is branched. Then we have to select and eliminate ach problem one by one. We shall select tone subproblem from branch, and then look out for optimal ways to eliminate it.
Other possible ways are Active Replication which is mainly physical redundancy of data, or Time Redundancy where we perform an operation several times hence attaining redundancy.
Computer Crimes mainly include offences such as Hacking, Spamming the other user’s computer, viruses, worms, Trojan Horse to attack the data security and privacy.
Certain security measures to safeguard yourself from such hacks/crimes could possibly be:
Asking the employees to put on Locks to their systems, woth relevant passwords.
Monitor activities of all employees.
Make sure that while hiring your company does extensive background check on employees.
Limit the access of employees to a ceratin point, like do not allow them to be admin, make them a separate user.
Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain your plan.
We cannot be accurate for the same, but following the above mentioned steps rigorously and in the best possible manner, then within few months, the crime rates/complaints/any such hacks number would definitely see a down rate :)
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.