jdc1944
asked on
Stand Alone IT Service Provison
Following a few high profile cyber attacks, especially on the public sector I've seen a recommendation being made to implement a stand alone IT provision independent of the network.
How is this implemented and how does it work in practice? If the entire network has to be shut down for some time to contain the attack, how would critical business system then operate and how would users be able to access their systems?
How is this implemented and how does it work in practice? If the entire network has to be shut down for some time to contain the attack, how would critical business system then operate and how would users be able to access their systems?
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.