Key backup is an important and seldom considered issue. As we describe in this chapter, the holder of an encryption key can be sick, unreachable, or otherwise unavailable. Major organizations have a contingency plan for handling such emergencies. Suggest ways that an organization could prepare for a needed key being unavailable. Would your plan also work for needed passwords or other critical data? That is, a critical file might be protected by a password, but the person who knows the password is unavailable. How could this case be dealt with? Suppose access is controlled by a biometric. How could the person’s absence be dealt with?
(Computer Security II)
Key backup is an important and seldom considered issue. As we describe in this chapter, the...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...