Describe how a ransomware incident would be contained and identified if an event occurred inside the given topology. What are the network security threats for a ransomware attack?

Business Continuity Plan

• The BCP should describe the normal operation standards, practices, and procedures for operating systems, including critical systems. Develop standard operating procedures based on what the team identifies as the most critical to least critical to continue business operations. Included in the standard operating procedures and best security engineering practices should be operating system fundamentals, operating system security, management of patches, and operating system protections.

• All partner nations at the summit have maintained that there will possibly be the use of an ad hoc wireless network. The nations’ CISOs will have to determine differences between rogue and authorized access points with consideration to authorized service set identifiers. These considerations will have to be included in the BCP.

• The BCP should be tailored to recover from a ransomware attack. Include leadership decision-making options for payouts in such currencies as Bitcoin, which uses blockchain technology. Based on the recent outbreaks of ransomware attacks, identify key components of the given topology and describe how a ransomware incident would be contained and identified if an event occurred inside the given topology. What are the network security threats for a ransomware attack? Include these vectors as scenarios in the BCP and address remediation paths.

© 2020 Essaylane.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.