Backup the System Disk for a Windows 8.1 Workstation

Procedure 2: Backup the System Disk for a Windows 8.1 Workstation

1.      
Using the Internet, research commercially available system backup tool or application. (Do not use any features or utilities that are part of the Windows operating system.) Then, identify appropriate sources of information and instructions for your selected tool. Using those sources, research the procedures required to

a.      
Create a “known good” copy (system backup or complete system image) of the hard drive containing the Windows 8.1 system and installed applications for a workstation in the SCADA lab.

b.      
Generate a hash code for use in verifying the validity and integrity of the backup file or system image file. (If your backup utility does not provide this, you will need to find a separate tool that will generate an MD-5 or SHA-256 hash value for the image file or backup file. See https://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/ for an explanation of file integrity checking using hash codes.)

c.      
You should also research and document best practices for labeling and storing the digital media containing the backup files and/or system image files. The storage location should provide secure storage yet be readily available to incident responders in the event of an incident. The label or storage log should include the hash value for each backup file and system image file.

2.      
Identify how the backup tool could be used during the preparation phase of the incident response and recovery process. Typical uses include:

a.      
Create a “known good” backup that contains a complete, verified and approved system configuration that includes the operating system and all required application software.

b.      
Create a copy of the original operating system installation (before software applications are installed).

3.      
Write a guidance document that identifies the tool, explains the capabilities it provides, and then lists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question “Is there anything else the incident responder needs to be aware of when using this tool?” 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

discuss: Qualitative research is a method of research that provides

 discuss: Qualitative research is a method of research that provides subjective data describing one’s perceptions, experiences, and meanings that accounts to contexts that helps understand the barriers that help bridge the gaps between scientific evidence and clinical practice.  An example, Green & Britten (1998) explain that qualitative research investigates attitudes, beliefs,

The use of drones by the U.S

Write an argumentative research essay, 1500-2000 words in length, focused on a topic of your choosing. The topic you select must be something about which you can find relevant scholarly research, and its focus must be narrow enough to fit within the required length of the paper. If you have

APA FORMAT Locate the Problem Statement section of the Research

 APA FORMAT Locate the Problem Statement section of the Research Prospectus, and draft 1 paragraph of no more than 250–300 words that addresses the following: Describe the study problem you will focus on for your dissertation project. The problem must be both practice-based and scholarship-supported, and therefore needs to consider

The National Organization of Nurse Practitioner Faculties (NONPF) has determined

The National Organization of Nurse Practitioner Faculties (NONPF) has determined nine broad areas of core competence that apply to all nurse practitioners, regardless of specialty or patient population focus. NONPF created the first set of Nurse Practitioner Competencies in 1990; the most recent updates were incorporated in 2017. This course

(1) Over the last five weeks I have asked students

  (1) Over the last five weeks I have asked students to view the website of the American Evaluation Association (AEA) as part of their course activities. For this mid-term I would like each of you to examine the AEA Topical Interest Groups (TIG) web page found at this link:

DUE AUG 8, 2022 Industry Competitor Ratios: Appendix D Ratios

DUE AUG 8, 2022  Industry Competitor Ratios: Appendix D  Ratios are rarely used in isolation. For a good understanding of a company’s financial performance, it is important to evaluate the company’s ratios relative to the industry in which it operates. For this assignment, you will use Mergent through the university

Homomorphic encryption

Information exchange in mobile agents and security risks (focused on privacy)4-5 sentences focus location exchange, why it is needed, how often, privacy issues Vehicular networks as mobile agents and trajectory exchange VANET is a type of mobile agents, focus on how it is structured, V2V, V2I, V2P, V2X two type

Reaction Action Paper Pick one of the articles Part 1 Nursing Assignment Help

                                                                        Reaction Action Paper Pick one of the articles Part 1 Describe the article.  1.      Theory 2.      Population 3.      Method/Analysis 4.      Results 5.      Limitations Part 2 Your reaction to article 1.      Is the article/framework sound? 2.      Are there better/different methods that could be used to better answer the research question?

Discussion Topic In Chapter 12 you read about the human

  Discussion Topic In Chapter 12 you read about the human service professional’s work within communities while addressing issues and problems of individuals. It is important that you as a human service professional familiarize yourself with methods to improve your life as well as the lives of your clients who

We have covered a lot of ground since the beginning

We have covered a lot of ground since the beginning of the course, and you have learned a great deal about the types of information available, how to discern its credibility, and how to present it to others in a way that continues the academic discussion.  Look back to the

Discussion Topic: Model Implementation Describe a model that you might

  Discussion Topic: Model Implementation Describe a model that you might use to introduce a policy change of your choosing other than what you will address in the upcoming assignment. Why is it relevant to this policy change? How would you implement that model? note: upcoming assignment is r/t workplace

Assume you are in charge of securing your organization’s applications

Assume you are in charge of securing your organization’s applications and associated data in the cloud. The transfer of data to and from the cloud is already encrypted. Answer the following question(s): Should you encrypt data before transferring it to the cloud or encrypt it after it is stored in

Think about Duguid’s Is Jesus in the Old Testament? Conclude

 Think about  Duguid’s Is Jesus in the Old Testament? Conclude the contents  (1-2 pages) and critically reflect on its main idea (2 pages). How have you read the OT in the past? How did the research challenge your thinking? How can you incorporate Duguid’s thesis into your own preaching/teaching ministry,

Overview Search the Strayer databases or Internet for hot topics

  Overview Search the Strayer databases or Internet for hot topics and emerging issues of financial statement fraud and other fraudulent acts committed by publicly traded companies, including those identified by the PCAOB. Consider the topics, trends, and longevity of issues identified and evaluate the effectiveness of federal regulations and strategies