Explore BrainMass
Share

Explore BrainMass

    Briargrove CLN System Failure

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    A system failure is occurring due to unknown software, many of the management personnel have loaded on their computers. The failure has brought down your system and is negatively impacting the organizational network. How would you handle the situation? What plans and measures will you put in place? What could have been preventative measures to reduce these risks? Please ensure that the help reflect the amount of credits provided.

    © BrainMass Inc. brainmass.com October 10, 2019, 8:06 am ad1c9bdddf
    https://brainmass.com/business/project-management/briargrove-cln-system-failure-608215

    Solution Preview

    The response addresses the query posted in 1059 words with APA References.
    //The use of internet and networking for the sharing and storing of data is an essential practice undertaken by many companies in the world. The installation of unknown software can create a system failure and can negatively affect the network of the organization. In the following discussion, the steps to be undertaken for resolving the system failure in Briargrove have been elaborated.//
    Briargrove CLN System Failure
    In the era of internet and information technology, the use of computers and networking is essential for every organization's proper functioning. There are many software and computer programs present on the internet that can harm the computers and damage the information and database of the organization (Stein, 2006). The kinds of software that harm the computers, their operating systems and the information stored in them are known as a virus, trojans, malware, and worms (Realtimepublishers.com, 2005). These are fictitious software, which corrupt the hardware and the software of the computer systems.
    In the Briargrove, a CLN failure has been caused due to the installation of unknown software, which corrupted the systems of the management team of the organization. For handling this situation, various methods can be effective for solution purpose:
    Firstly, the affected computer systems, desktops and laptops, that are connected to the organization's network should be removed from the networks. This will help in preventing the further spread of the unknown fictitious program or software (Stein, 2006). All the employees in the organization should be restricted to install any kind of software on their systems (Elleithy & Sobh, 2012).
    The second step that needs to be taken is the analysis of the extent ...

    Solution Summary

    The response addresses the query posted in 1059 words with APA References.

    $2.19