Planning shortcoming in the case of Citibank
Order ID:89JHGSJE83839 Style:APA/MLA/Harvard/Chicago Pages:5-10 Instructions:
Planning shortcoming in the case of Citibank
we have lost the backup tape’ Citibank admits assignment
Assignment 2
“Citibank admits: we’ve lost the backup tape”
In 2005, one of the worst nightmares of Citibank had come true when the finance division of the company had experienced a lethal situation in which data of about 3.9 million customers stored in the backup tape was found to be missing (Citibank admits: we’ve lost the backup tape. 2019). It was declared by Citibank that the backup tape contained the personal information of the customers and was lost by the United Parcel Service in times of transit. The
backup tape contains the important information of the customer such as the social security number as well as the history of transaction with respect to open as well as close accounts of the lending branches of the company in
USA missing (Citibank admits: we’ve lost the backup tape. 2019). It was declared by the bank that the data stored in the tapes were not encrypted on the electronic transmissions however the customers were informed that none of
the personal information of the customers had been accessed in a wrong manner. The case of the lost tapes had reflected upon the loopholes in the security system of Citibank and also showed how Citibank had been ineffective in its business continuity planning that could otherwise have been successful at averting any such risk. It also showed that the company lacked the desired resilience for information security and disaster planning. Citibank was
also unable to recover The lost tapes containing search important information even after searching for the tapes for 6 weeks. In this respect, it can be stated that although there was no data misused by an unauthenticated user,
this was such a case that had affected the trust between the customers and Citibank.
Planning shortcoming in the case of Citibank
The case of data tapes been lost containing important information shows that Citibank did not have an effective business continuity plan and that there were also shortcomings in the planning of data recovery since the data was never found. In this respect, the measure that could have been taken by Citibank was the application of the practices for continuous data protection and encryption of data. With the implementation of the continuous data
protection, Citibank would have been able to keep a backup of the data in a continuous manner and also risks of any data loss could have been detected from before (Malik & Younis, 2016). There should also have been encryption
of the data in order to minimize the risk of data being misused by an unauthenticated user. Electronic storage of data over the cloud could also have been a potential alternative for adequate storage of the data in place of storing data in tapes (Malik & Younis, 2016). This also shows that the Citibank did not have an adequate plan for any disaster in the future as deceased and hence they could not address the issue effectively. For adequate planning
regarding data recovery, encryption is absolutely necessary that was ignored by Citibank in this case. This case is a perfect example of the negative impact of business continuity planning and in effective data recovery planning.
References
Citibank admits: we’ve lost the backup tape. (2019). Retrieved from https://www.theregister.co.uk/2005/06/07/citigroup_lost_tape/
Malik, M. H., & Younis, N. (2016). CYBER CRIMES PREVENTION AND RECOVERY STRATEGIES. Science International, 28(3). https://www.sci-int.com/pdf/8190287451%201%20a%202489-
Assignment 3
COUNTER TERRORISM PREPARATION
The present day scenario makes it evident for the organizations to take precautions against burning issues of the world, like terrorism and threats like biological attacks, toxic gas emission and radiological contamination attacks. To counter the terrorist attacks, the concerned organization must abide by a few strategies beforehand. The foremost task is to create a proper planning on what to do and what not to do while such a crisis appears.
Then a false scenario of terrorism should be created to ensure the functioning of the pre-planned strategy and check and strengthen the presence of mind of each individual in such a situation. With practice, better planning would
be developed and the employees would be able to stabilize their thinking. Along with this, crisis management, emergency response, and business continuity plans also hold importance. The crisis management plan would help to develop thedecision-making skills and enhance crisis communication strategies, the emergency response plan would provide a better understanding upon the aftermath of the incident and steps to be taken for preserving as many
lives as possible like evacuation. Business continuity plan would be helpful to keep the business running even after the attack. It includes grasping every little opportunity made available to the company and providing the staff with alternative tasks or positions to ensure their means of earning. The employees must practice and learn the different ways of communicating with each other and the outside world during the attack. Practicing and revising the
plans, repeatedly, will make the efforts worth it. (Kaplan, 2017)
Biological, chemical and radiological terrorism
Biological terrorism, causing anthrax, smallpox, plague, etc. have been evident in the Tokyo subway, Iraq and the former the Soviet Union. Immediate measures need to be taken during and after the attack including mass vaccination and prophylactic treatment. Precautions and prevention should be planned beforehand. Detection and surveillance will help to identify the agents. Immediate diagnosis, response, and proper communication will help
the situation largely. Chemical weapons like sarin and chlorine gas have been used in Syria and in World War I. Their immediate identification is necessary for providing a solution. Laboratories should be well prepared to counter
such attacks by making the antidotes available as soon as possible. Decontamination of the victims and keeping their clothes in a sealed bag is also a necessary action. Another dangerous kind of terrorism is the radiological
terrorism. Though it has not been observed till date, precautionary measures like monitoring of the local areas and spreading awareness should be done, along with a counter plan in hand. To fight all these kinds of attacks, the public should be educated well about these topics. (Tharratt & Albertson, 2016)
RAID technology
RAID technology is the means of increasing the performance of an application and make it reliable. There are mainly five levels of RAID, each used for a specific function. RAID 0 is used for striping, RAID 1 for mirroring, RAID 5 for striping with a parity checksum and so on. Mac OSX, as well as Windows Server 2012, use the functionality of software RAID 0 through RAID 5 accordingly. IOP RAID implementation seems to be the most common one. It is also the most expensive implementations of all. (Galloway, Callison, Pellegrino & Tan, 2015)
References
Galloway, W. C., Callison, R. A., Pellegrino, G. J., & Tan, C. S. (2015). U.S. Patent No. 9,146,695. Washington, DC: U.S. Patent and Trademark Office.
Kaplan, A. (2017). The counter-terrorism puzzle: A guide for decision makers. Routledge.
Tharratt, R. S., & Albertson, T. E. (2016). Chemical and Biological Terrorism Incidents and
RUBRIC
Excellent Quality
95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support
91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology
58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score
50-85%
40-38 points
More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points
Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points
Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality
0-45%
37-1 points
The background and/or significance are missing. No search history information is provided.
75-1 points
Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points
There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow Planning shortcoming in the case of Citibank