Discuss the advantages and disadvantages of distributed systems in a business environment.
April 28, 2020Identify fundamental concepts of Big Data management and analytics.
April 28, 2020Question Description
n
nnCrisis ManagementnnCrisis management is the procedure in which companies deal with events that are disruptive and threaten to harm their stakeholders. The management of IT plays an essential role in the regulation of disaster since most activities are accomplished on the system.nnDuring the process of imaging, the data may be compromised if the information on suspect media is changed. The investigators of the system have frequently confused destination disks with the compromised pictures when performing the imaging process. Therefore, the write blocker significantly protects the process, making it difficult for third parties to access the information (Whitman, Mattord, & Green 2013). White blockers enable individuals to acquire data from a drive without the option of accidentally destroying the contents of the drive. This is made possible through reading commands that are allowed to pass as write commands are blocked.nnThe blockers may either be in hardware or software form. The hardware write blocker is easily identifiable and accomplishes one command at a time. The software blocker is more potent since it adds to the assessor’s burden of proof. The general imaging process is detailed, making it easy to identify the irregular bug that may result in a crisis to the system (Cook 2015). The first process of crisis management involves gathering evidence from the storage and performing a physical validation. The images on the disk should be loaded on forensic tools to enable the collection of enough evidence.nnCartwheeling is a legal method of developing search items that may be challenging. Therefore, the users of the system must be educated to ensure they understand the safe sites and items to download that may not compromise company information. How can crisis management assist inadequate security measures in the system?nnReferencesnnCook, N. D. (2015). Crisis management strategy: Competition and change in modern enterprises. Routledge.nnWhitman, M. E., Mattord, H. J., & Green, A. (2013). Principles of incident response and disaster recovery. Cengage Learning.nn