Purchase Solution

Briargrove CLN System Failure

Not what you're looking for?

Ask Custom Question

A system failure is occurring due to unknown software, many of the management personnel have loaded on their computers. The failure has brought down your system and is negatively impacting the organizational network. How would you handle the situation? What plans and measures will you put in place? What could have been preventative measures to reduce these risks? Please ensure that the help reflect the amount of credits provided.

Purchase this Solution

Solution Summary

The response addresses the query posted in 1059 words with APA References.

Solution Preview

The response addresses the query posted in 1059 words with APA References.
//The use of internet and networking for the sharing and storing of data is an essential practice undertaken by many companies in the world. The installation of unknown software can create a system failure and can negatively affect the network of the organization. In the following discussion, the steps to be undertaken for resolving the system failure in Briargrove have been elaborated.//
Briargrove CLN System Failure
In the era of internet and information technology, the use of computers and networking is essential for every organization's proper functioning. There are many software and computer programs present on the internet that can harm the computers and damage the information and database of the organization (Stein, 2006). The kinds of software that harm the computers, their operating systems and the information stored in them are known as a virus, trojans, malware, and worms (Realtimepublishers.com, 2005). These are fictitious software, which corrupt the hardware and the software of the computer systems.
In the Briargrove, a CLN failure has been caused due to the installation of unknown software, which corrupted the systems of the management team of the organization. For handling this situation, various methods can be effective for solution purpose:
Firstly, the affected computer systems, desktops and laptops, that are connected to the organization's network should be removed from the networks. This will help in preventing the further spread of the unknown fictitious program or software (Stein, 2006). All the employees in the organization should be restricted to install any kind of software on their systems (Elleithy & Sobh, 2012).
The second step that needs to be taken is the analysis of the extent ...

Solution provided by:
Education
  • MBA (IP), International Center for Internationa Business
  • BBA, University of Rajasthan
Recent Feedback
  • "Thank You so much! "
  • "Always provide great help, I highly recommend Mr. Sharma over others, thanks again. "
  • "great job. I will need another help from you. "
  • "first class!"
  • "Thank you for your great notes. Will you be willing to help me with one more assignment? "
Purchase this Solution


Free BrainMass Quizzes
Marketing Management Philosophies Quiz

A test on how well a student understands the basic assumptions of marketers on buyers that will form a basis of their marketing strategies.

Understanding the Accounting Equation

These 10 questions help a new student of accounting to understand the basic premise of accounting and how it is applied to the business world.

Basics of corporate finance

These questions will test you on your knowledge of finance.

Accounting: Statement of Cash flows

This quiz tests your knowledge of the components of the statements of cash flows and the methods used to determine cash flows.

Income Streams

In our ever changing world, developing secondary income streams is becoming more important. This quiz provides a brief overview of income sources.