It makes use of data mirroring. This is achieved by combining two physical drives and then striping data across them. In this arrangement, the first stripe is the original data while the second is the mirror data, which is a copy of the original data but is written in RAID –level 1. This level provides 100% data redundancy but have diminished data storage space.
Relative value of an asset is the likeability of an asset when compared to another one. One factor that needs to be put into consideration when determining this is the ease with which the asset can be converted to cash. Other factors include the potential of value appreciation of the asset and the degree of risk of holding or purchasing the asset. Other factors include the sentimental value of the asset.
This model not only prescribe who or what process gains access to a computer process but also prescribes the type of access that is permitted. These controls can be implemented in the computer systems or in external devices. They provide wide range of authorized operations.
The PCI simplifies management of remote system by providing around-the-clock access to the server remotely. RSA, for Remote Supervisor Adapter, monitors the server and in return sends out alerts to the designated recipients through the local area network, pager, email, or SNMP if there is a detection of failure (Stallings, 2007).
Chain of evidence is the documentation of chronology of events that show the handling, transfer and disposition of evidence, which can either be physical or electronic. A chain of evidence is established by first taking the item being investigated and giving it to forensic experts so that they establish and get the fingerprints. The evidence is then stored up to the day when evidence is needed concerning the same.
References
Ciampa, M. (2008). Security+ Guide to Network Security Fundamentals. New York, NY: Cengage Learning.
Stallings, W. (2007). Data and computer communications. New York, NY: Prentice hall.