CIS220L-U5-Discussion.docx - Discuss the challenges of maintaining information security at a remote recovery location o The first and main challenge I

CIS220L-U5-Discussion.docx - Discuss the challenges of...

  • ECPI University
  • CIS 220L
  • WhosaidMe
  • 1
  • 100% (21) 21 out of 21 people found this document helpful

This preview shows page 1 out of 1 page.

Discuss the challenges of maintaining information security at a remote recovery location.oThe first and main challenge I believe is the availability of your data from via the remote recovery location. During a disaster, even tough prior, precautions for continuous communication was in place, anything could have caused a malfunction along the way. Usually, issues like this are caused by the primary falling out of sync with the other system because the system is either offline or was offline for too long and needs intervention. This also means verifying the integrity of the data, especially if things aren’t synced properly. Data corruption can easily occur and depending on your data structure, replicas and backup planning, the connection from the recovery location should be effortless. As well, data-in-transit is just as vulnerable to hacking and interception by hackers as is your data-at-rest. Much news on adware, malware

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture