Describe your approach to handling an organization

Assignment Help Computer Engineering
Reference no: EM133520987

Case Study: A vital role for all managers is planning. Managers in IT in general and information security usually provide strategic planning for an organization to ensure the continuous availability of information systems. Unfortunately for managers, the probability that some form of the damaging event will occur, whether it be from inside or outside, intentional or accidental, human or nonhuman, annoying or catastrophic, is very high. Thus, managers from each community of interest must be ready to act when a successful attack occurs. There are various types of plans for events of this type, and they all fall under the general definition of contingency planning. A contingency plan is used to anticipate, react to, and recover from events that threaten the security of information and information assets in the organization; it is also used to restore the organization to normal business operations. Contingency planning (CP) typically involves four subordinate functions: 1 Business impact analysis (BIA), Incident response planning (IRP), Disaster recovery planning (DRP), Business continuity planning (BCP).

Question: Describe your approach to handling an organization's incident contingency plan.

Budgeting for Contingency Operations As a final component to the initial planning process, the CPMT must prepare to deal with contingency operations' inevitable expenses. Although some areas (such as incident response) may not require dedicated budgeting, other locations (such as disaster recovery and business continuity) require ongoing expenditures, investment, and service contracts to support their implementation. The ugly reality is that many organizations are "self-insured" against some types of losses, such as theft of technology, equipment, or other resources. Ideally, this means that instead of payments to an outside insurance organization, the organization puts a set amount each fiscal cycle into an account it can then draw upon should replacements be required. However, with tight budgets and drops in revenues, some organizations forego these investments instead of betting on the probability that such losses, if they occur, will be minimal and can be funded out of regular budgets. Should a disastrous expense occur, however, the organization is at risk of complete failure and possible closure. Some of the budgeting requirements of the individual components of CP planning are presented in the following sections. Incident Response Budgeting to no small extent, IR capabilities are part of a typical IT budget. It is customary for the CIO to have their managers ensure that data protection and response and backup and recovery methods (described later) are part of normal operations.

Question: How would you present a financial report for the next year to your supervisor or CEO? What analytics would you offer to support your upcoming budget?

 

Reference no: EM133520987

Questions Cloud

What is the strength of each brand : What is the strength of each brand. Which did the article recommend. Which would you purchase based on how you use your computer?
How would you describe one of the cognitive biases : How would you describe one of the cognitive biases discussed in the video or in your assigned reading - How can biases cause people to make inaccurate decisions
Identify and define all hardware and software devices : Identify and define all hardware and software devices, and the different types of sensitive data the organization will store. Explain the organization
How would you countercondition your given cr : How would you countercondition your given CR? (Make sure to use clearly label each component of the counterconditioning template)
Describe your approach to handling an organization : Describe your approach to handling an organization's incident contingency plan. How would you present a financial report for the next year to your supervisor
What are issues associated with developing those plans : What are standardized crisis plans and what are issues associated with developing those plans? Do standardized crisis plans benefit some populations/communities
Disadvantages of direct assessments in aba : Discuss the advantages and disadvantages of direct assessments in ABA?
Discuss the internal and external factors needed to perform : discuss the internal and external factors needed to perform a thorough SWOT analysis for BCC. identify strengths and weaknesses, while external factors are
Discuss challenges to creating performance : Discuss challenges to creating performance indicators and collecting data that shows actual performance.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identify the independent and dependent variables

Assignment: Explain whether you chose to use an independent-samples t test or a matched-samples t test. Provide a rationale for your choice. Identify the independent and dependent variables

  Make java class that creates an array of integers

Write down a Java class that creates an array of integers, fills it with values, prints the unsorted values, sorts the values into ascending order, and finally prints the sorted values.

  Write down a sql statement to show warehouse

Write down a SQL statement to display the SKU and Description of all items stored in the Seattle, Chicago or New Jersey warhouse. Do not use IN.

  Who has held the one-year position for the past four years

Although everything was fine five minutes ago, a secretary cannot get her computer to send a document to the printer. The document must be printed for the meeting her boss has scheduled to begin in fifteen minutes. (Kirby & Goodpaster, 2007. The i..

  Determine the steps that can be taken to mitigate business

Summarizes the results of a risk assessment for Business Continuity Risk. Determine the steps that can be taken to mitigate Business Continuity risks.

  The checksum field in a single parity bit scheme

What will be the value of the checksum field b for the case of a two-dimensional parity scheme? Your answer should be such that a minimum-length checksum is used.

  How many variables and observation

Creates anew variable called "average1and3YrReturn%" in which is the average of 1YrReturn% and 3YrReturn%.

  What is the size of the permutation key

Eve secretly gets access to Alice's computer and using cipher types abcdefghij. What type of attack is Eve launching? What is the size of the permutation key?

  Explain to non-technical management the given threats

Barrowclough & Asif, (2018) discussed, securing cloud hypervisors in more technical details, including covering the Cloud Security Alliance top 12 threats.

  Calculate their free throw shooting percentage

The user is presented with a form that asks them to enter their jersey number, their number of completions and the number of attempts.

  Write a recursive method to reverse a string

Write a recursive method to reverse a string. Explain why you would not normally use recursion to solve this problem.

  Use of mobile devices and the growth of the internet

Students are required to write an academic report as per the format outlined in chapter 5 of the textbook. The report must follow Harvard citation and referencing guidelines.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd