Nt1330 Unit 6 Assignment

Words: 1343
Pages: 6

When you create files or application materials, you need to think about anyone that could access the file or data. Remember, once these files are on a share drive or shared with others like on an attachment with Outlook, the data can be changed or deleted. By controlling permissions, one can ensure the data stays the same for everyone. For years, we used Microsoft Outlook Calendar to prepare our work schedule. We recently changed to Excel spreadsheet that we have given the managers the read / write authority; whereas, the employees receive read only access. Only a manager can alter the data for scheduling; therefore, we give ourselves only the ability to change data. What is even better, is that Excel files gives you the ability to see who is the last to modify the data.
In the business function that I described is important that only the authorized have the ability to change the data. Since the employees need to know what their work assignment is for that day, they need access to the schedule, but does not need to change the data. This must be a manager decision on changing the employee’s duties for that day. Therefore, we place the schedule on a Share
…show more content…
The best recovery tactics uses Preparation, Detection & Analysis, Containment Eradication & Recovery, and Post-Incident Activity. The first task is the preparation phase, a team needs to decide on the steps it will take. From the day that a system is put in action, security incidences need to be prepared for in who will lead. The thought process before is the best way to protect. If incident does occur, a checklist beforehand is better than attempting to start when the system has already been attacked. Creating a jump kit with all necessary programs and equipment will help mitigate the damage (Cichonski, Millar, Grance, & Scarfone, K,