Preview

Omega Inc. Bia

Powerful Essays
Open Document
Open Document
2982 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Omega Inc. Bia
BACKGROUND
Omega Research is a rapidly growing research and consulting firm. They have a single main office located in Reston, VA and three small branch offices located in San Diego, CA, Salem, OR, and Kansas City, MO. Omega is not currently involved in e-commerce or business-tobusiness relationships.
Two weeks ago, Omega experienced a significant loss of proprietary data (estimated value $550,000.00) that was stored electronically in an Oracle database in their main office in Reston. The data was unrecoverable and backups were not being routinely maintained, so no restoration was possible. Although he has no hard evidence, Omega’s CTO believes that the loss resulted from deliberate deletion of files by a systems administrator from the Kansas City office that had been “let go” several weeks prior to the loss. Needless to say, the CTO has been tasked to “get things under control.”
You have been hired as a consultant to develop a comprehensive plan for improving the company’s recovery posture in order to prevent future outage of Omega’s critical systems and network resources. Your guidance and observations will eventually be used to develop a long-term procedural and policy solution for Omega Research. The CTO has stepped up to the plate and made the commitment to do whatever it takes to address these issues.

Baseline Network Infrastructure * Omega leverages AT&T Managed Internet Services for each of its office locations. * Omega owns and manages the border routers for each of their office sites. * Offices in Reston, San Diego, and Kansas City receive full T-1 service. * Offices in Salem receive 256k F-T1 circuit service.

Systems

Business processes provided by AIX Environment 1. Financial 2. Reporting 3. Data Warehouse

LAN

Vendor | Services | Address | Phone | Contacts | IBM | Tape Library TSM Server | 522 South Rd Poughkeepsie, NY 12601 | 214 451-7747 | Steve Barretta

You May Also Find These Documents Helpful

  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    Lafleur Trading Company is based upon a decentralized organizational structure with the chief executive officer on top followed by chiefs of information, financial, and operations below. A decentralized organizational structure is where high-ups delegate authority down a chain of command to allow employees at many levels to make decisions. This is beneficial because minor problems can get solved at a quicker rate because they don’t need to get escalated up the entire chain. This in turn leaves upper management more time to accomplish their own agendas for the company. Because Lafleur Trading Company has employees at many levels within the organization, proper file data management is extremely crucial.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What type of system do you currently use and are they up-to-date on security patches and upgrades?…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CIS-345 Project

    • 1044 Words
    • 5 Pages

    In addition, XelPharm owns a large distribution warehouse approximately four miles away from the headquarters. Until now, its networks have relied entirely on wired connections. The company’s CIO (chief information officer) decided long ago that he would wait until wireless technology “settled down” before investing in it.…

    • 1044 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt2580 Notes

    • 1034 Words
    • 5 Pages

    A plan designed to help an organization continue to operate during and after a disruption…

    • 1034 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    This company needs to look at for the future, for data loss prevention to be effective, the company must decide on the right strategy, employ the right people, target the right data and purchase the right technology. With these accommodations this should reduce the likelihood and cost of future data, breaches and or violating compliance, rules and laws and or regulations. This will also allow the company to have control over how and what data is being exported and what employees or students are online and how this data is used throughout this company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How can ExtremeNet’s leadership best repair the relationship between management and employees while meeting the needs and goals of the company? Demonstrate an understanding of the issues and how to best unify the company to move forward.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Olg Scandal

    • 1962 Words
    • 8 Pages

    According to Smith (2013), the organization later on responded to calls for action and committed to the below-listed steps as a way of rebuilding lost client trust and reassuring the public of its commitment to…

    • 1962 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Introduction Small Organizations Scenario: Grace Community Church Large Organizations Scenario: General Products Corporation OU-level and object-level recovery Branch Office Recovery Disaster Recovery Forest-wide recovery Testing Major or Irreversible Changes Staff Training Domain Consolidation and Restructuring Recovery Best Practices Backup Schedule Restore Order SYSVOL Best Practices for Restoring SYSVOL Recovery Technical Issues AD Database Size ESE page corruption SYSVOL Recovery SYSVOL Restore Types Group Policy Containers and Version Synchronization EFS Key Recovery Guidelines for EFS Key Recovery USN Rollback What is USN Rollback? How to Avoid USN Rollback How to Fix USN Rollback 10 10 11 11 11 12 12 1 1 1 3 3 3 5 5 5 6 6 6 7 7 7 7 7 8 8 8 9 9 Backup Expiration Lingering Objects What are Lingering Objects? How to Remove Lingering Objects Administrator Password Recovery 12 13 13 13 13…

    • 4998 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.…

    • 532 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Communication and Crisis

    • 1022 Words
    • 5 Pages

    Freeo, S. K. (n.d.). Crisis Communication Plan. Retrieved Nov 24, 2012, from Pr blue print: www3.niu.edu…

    • 1022 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Bausch and Lomb, Inc (a)

    • 1065 Words
    • 5 Pages

    What is the impact of the December 1993 shipments of conventional lenses to Bausch and Lomb 1993 financial statements? Is the impact significant?…

    • 1065 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Atlantic Corp

    • 2254 Words
    • 10 Pages

    At an expected purchase price of $319mm (for the linerboard plant as well as box plants), the acquisition represents a more than 50% discount to the cost of setting up a similar plant. Moreover, the acquisition will provide Atlantic with an immediate source of linerboard, as compared to a 2-year gestation period if it were to build its own plant.…

    • 2254 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In 2003, Daniel Bass, a 24 year old computer-systems administrator was found to have stolen the data of millions of individuals from Acxiom’s databases. He spent two years collecting this information and stored it on compact discs (Behar, 2004). He broke into their system by simply cracking passwords (Behar, 2004). Bass was not the only hacker to crack Acxiom however. While authorities were investigating Bass, they ultimately discovered an additional hacker group from Boca Raton, Florida, who had cracked the passwords for the same server that Bass had gotten into as well. While they accessed information for millions of people; it did not appear that either hacking incident resulted in the defrauding of any of the individuals whose data was stolen (Behar, 2012). Acxiom definitely needed to do something to beef up their security measures and protect their customers’ data. They first hired a chief security officer, which had not been a position until these incidents. The chief security officer instituted mandatory encryptions, as well as working to prevent cybercrimes. Acxiom additionally began to conduct security audits (both conducted from inside and outside firms) to test for weaknesses in security.…

    • 598 Words
    • 3 Pages
    Good Essays