In the business function that I described is important that only the authorized have the ability to change the data. Since the employees need to know what their work assignment is for that day, they need access to the schedule, but does not need to change the data. This must be a manager decision on changing the employee’s duties for that day. Therefore, we place the schedule on a Share …show more content…
The best recovery tactics uses Preparation, Detection & Analysis, Containment Eradication & Recovery, and Post-Incident Activity. The first task is the preparation phase, a team needs to decide on the steps it will take. From the day that a system is put in action, security incidences need to be prepared for in who will lead. The thought process before is the best way to protect. If incident does occur, a checklist beforehand is better than attempting to start when the system has already been attacked. Creating a jump kit with all necessary programs and equipment will help mitigate the damage (Cichonski, Millar, Grance, & Scarfone, K,