Preventing Data Loss: Cyber Protection Strategies Explained

School
STI College (multiple campuses)**We aren't endorsed by this school
Course
BSIT 101A
Subject
Information Systems
Date
Dec 12, 2024
Pages
2
Uploaded by SuperCloverRedPanda41
Data protection software and appliance technology developer Arcserve is during long-term recovery from a human error that resulted in an as-of-yet-unknown number of end-user clients from the company’s StorageCraft business losing their backup data. The error happened when the company moved the StorageCraft backend operations from an internal data center to the Google Cloud Platform to add resilience to the system. While the data loss does not impact primary data, it leaves clients’ primary data at risk because it may not be backed up. Arcserve is in the process of remediating the issue with its StorageCraft MSPs, including looking at how to reseed the backups and ensure previously protected data is protected again. 06 Quiz 1 IT2222 Name Jerick Soliman Date Section 11/16/2024 Score Direction: In at least three (3) sentences, assess and elaborate on the data loss issue using the scopes of cyber protection. (5 items x 5 points) Source: https://www.crn.com/slide-shows/storage/arcserve-ceo-storagecraft-backup-data-loss-not-acceptable- Prompt: Using the scopes of cyber protection, what would you have done to prevent StorageCraft’sbackup data loss? 1. Safety: The most crucial safeguard against data loss it to regularly back up all your data. Before a calamity happens, make sure your back up data is accurate and not corrupted, invalid, or wrong. 2. Accessibility: Ill store data back up on a different server or preserve at least one copy of the original data on a disk other than the one on the PC youre backing up. 3. Privacy: Miligating individual employees from accessing particular types of data on your network is another aspect of preventing data loss. Ill given an IT team the authority to establish access levels, make rules that limit how customers may use company data, and Require new hires to adhere to security. 4. Authenticity: Hardening a database as mush as you can is one of the best techniques to prevent data loss. Look right away to disable or delete Any services or features you are not utilizing. 5. Security: A crucial initial step in safeguarding your sensitive data is selecting a firewall and antivirus program. All types of sensitive information can be stolen by viruses and malware, which results in even bigger data breaches. GRADING RUBRIC: Performance Standards Points The student provided reasonable preventive actions. 3The student elaborated in at least three (3) sentences. 2Total 506 Quiz 1 *Property of STI
Background image
Page 1 of 1
Background image