Saturday, February 15, 2020

Field Project Research Paper Essay Example | Topics and Well Written Essays - 3000 words

Field Project Research Paper - Essay Example In my personal audit, the following relevant information were collected and gathered: (1) identifying and examining if my identity is safe; (2) the reasons why I need to protect myself from identity theft; and (3) how I could protect myself using very basis guidelines against potentially exposing myself for incidents of identity theft ( (Identity Theft Protection (IDPST), 2012). During the course of the personal security audit, as I was made aware that through answering and going through the questions, the following areas were the identified strengths: (1) logging off and locking my computer every night; (2) responsible use of access information by not sharing it to others; and (3) being extra careful on transmitting personal information through email. However, one noted that there was an eminent weakness in the use of passwords. In one instance, I discovered through friends that there were sent some messages through email apparently being sent from my email address. In this regard, there was potential risk in my password being compromised. As needed, I immediately changed my password and the incident did not happen again. Through browsing more information on doing a personal security audit, I learned that by believing that I would not become a victim of identity theft, I was actually exposing myself to the risks of being unprotected and exposed to security risks. In the LifeLock official website, an organization that aims to provide proactive identity theft protection to members who opt to register, it was disclosed that through do-it-yourself personal security audits using free credit bureau reports (AnnualCreditReport, 2012), I would only receive the minimum amount of information for personal security audit. Credit monitoring done by financial institutions generates credit alerts, address monitoring and information from the credit bureau reports. The LifeLock Identity Theft Protection boasts of covering proactive protection, advanced internet monitoring, cre dit alerts, non-credit alerts, address monitoring, lost wallet protection and credit bureau reports (LifeLock, 2012) for prices such as $25.00 / month or $275.00 / year for a LifeLock Ultimate package or a minimum of $10.00 / month or $110.00 / year for a LifeLock package (LifeLock, 2012). The safety tips provided by the IDPST site are likewise helpful in making me more aware of areas to focus on, such as the need to dispose of mail or correspondences that has my personal address and information; never carrying the SSS card; never using the SSS card as an identification number; being careful of credit card receipts; being careful of using debit cards when shopping online; and keeping personal information within my area of residence and not to be carried along. By doing so, the personal security audit enhanced my awareness on areas to be most careful of and to follow the simple guidelines that would assist in protecting myself from identity theft. In sum, the personal security audit made me realize that my personal practices in terms of identity protection (never carrying my SSS card in my wallet; locking up personal ids and information in a safe box at home); credit cards (using a virtually difficult signature to replicate and indicating that a photo ID is required; having photocopies of the credit cards safely at home; checking and monitoring all credit card transactions) and improving my password all ensure that I would be duly protected from identity the

Sunday, February 2, 2020

Disaster Recovery Plan (Information Systems) Term Paper

Disaster Recovery Plan (Information Systems) - Term Paper Example Troubleshooting Plan’ hardly needs any over emphasis; particularly, when confronted with serious I T system problems which have the potential of bringing the entire operations to a grinding halt – a virtual disaster, which any organization can ill afford. The ultimate aim of this project is to protect the principal business functions and assets, and suggest a back up strategy to successfully bail out AU in the event of disasters. The project shall attempt to examine all the relevant issues connected with identifying all the assets of AU and the risks associated with them, together with their linkages in relation to a wide variety of likely disasters, concluding with the assembling of a disaster recovery team. This effort at compilation of a dynamic Disaster Recovery Plan is to address the pertinent issues by utilizing the famed â€Å"5 W’s & H ïÆ'   What, Where, Which, When, Who and How† approach, by providing convincing answers to the six core questions spread out in the six sections that follow! In an ever changing world, organizations should be wary of natural or manmade disasters that could disrupt business processes. Loss of customers apart, millions of dollars could go down the drain and never recovered if business processes are disrupted and IT systems do not recover fast enough to normalcy within the optimum response time. The Business Continuity Plan is intended to resume business processes whereas the restoration of the IT systems is by the Disaster Recovery Plan. The objective of the latter is to restore the operability of systems that support mission-critical and critical business processes to normal operation in the quickest time possible. Business continuity plan is an amalgam of the business resumption plan, incumbent emergency plan, incident management plan, continuity of operations plan, and disaster recovery plan, all rolled into one. The following treatise presents an overview of a disaster management recovery exercise. An asset is