Detail the dr team roles responsibilities and sub teams

Assignment Help Basic Computer Science
Reference no: EM13463036

Consider a scenario where the contingency planning management team (CPMT) of your organization has designated you as the disaster recovery team leader, and the preparation and planning of this component of the security program is now under your purview with a team of 11 employees including yourself.

Write a two to three (2-3) page paper in which you:

Q1. Detail the DR team roles, responsibilities, and sub teams that would be implemented, and construct an organizational chart for the team through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Q2. Describe the proper procedures and policies that would be implemented specific to the DR team personnel as well as special equipment that would be required.

Q3. Draft an executive summary to the DR plan and explain the purpose of the plan and high-level specifics for upper management.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13463036

Questions Cloud

Conversely determine the effect of information technology : q1. evaluate and discuss the human resource security privacy and stability issues affected by information technology.
Describe what technologies you believe provide the biggest : assess the challenges e-business and e-commerce technologies present to the field of information technology. describe
Wite essay on different neurological disorders which can : write 500 word essay on 2 different neurological disorders that can occur in development and how it affects
Seculate the foreseen challenges when the organization : imagine you are an information systems security officer for a large federal government contractor. the cio has recently
Detail the dr team roles responsibilities and sub teams : consider a scenario where the contingency planning management team cpmt of your organization has designated you as the
Explain the difference between project-based and : prepare a list of it project-based tasks in an organization where you have worked. if you have not worked in any
Explain some of the most effective ways for companies to : what are some of the most effective ways for companies to monitor employee motivation satisfaction and performance?
Determine the security risks with respect to phishing : mobile banking features have added several advantages for customers however there are security risks that come with
How important is the fdca project for the us census bureau : how important is the fdca project for the u.s census bureau? how does it impact decision making and operational

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create flowchart and psuedo code for math program

Create flowchart and psuedo code for math program which permits the user to enter two separate numbers and choose one of four mathematical operations (add, subtract, mutiply, divide).

  How long will it take to reach steady-state value

Investigate the effect of the parameter b on y(t). To do this, plot y versus t for several values of b on the same plot. How long will it take for y(t) to reach 98 percent of its steady-state value?

  Describe an algorithm for a turing machine

Describe an algorithm for a Turing machine which receives the integer n as input and proceeds to write the description of the n-th Turing machine from the standard enumeration on its tape.

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

  Explaining dui and charges of domestic violence

You will be handling sensitive information and may end up in court as a technical or expert witness. How can things such as a DUI, charges of domestic violence and other items affect your career?

  Explaining straight-line depreciation method

Explain in scholarly detail how to carry out Straight-line Depreciation Method calculations.

  What fraction of bus cycles are available for dma transfer

Estimate the maximum transfer rate if DMA is used. For DMA access, assume one word is transferred for each bus cycle, and ignore any setup or status-checking time. Your answer from part B should be helpful for this calculation. million words /sec

  What is x after the following if-else statement is executed

What is x after the following if-else statement is executed? Use a switch statement to rewrite it and draw the flowchart for the new switch statement.

  Propose three to five additional activities

Propose three to five additional activities you think should be added to a Gantt chart to help you estimate resources and durations. Write a one-page paper describing these new activities.

  Draw a complete e-r diagram

Each club has one moderator, who might or might not be a faculty member. Draw a complete E-R diagram for this example. Include all constraints.

  Whena router encounters

Whena router encounters an error in an IP header it:  a.returns the packet to the sending router. b. returns the packet to the sending router with an error advisement.

  Protect proprietary interest by addressing ethical issues

Advise whether you agree or disagree with CEO, specifically addressing ethical issues involved. Suppose you make a decision to hire a hacker, how would you protect your proprietary interests?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd