Determining component reliance and dependencies

Assignment Help Computer Engineering
Reference no: EM131999008

Assignment 2: Business Impact Analysis

In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the information systems and assets. The primary objective of a business impact analysis (BIA) is to identify the assets that are required for continued business operations in the event of an incident or disaster. Thus, a critical step in the development of an effective BIA includes establishing component priorities and determining component reliance and dependencies. Additionally, organizational personnel must know their responsibilities during recovery efforts.

Write a three to five (3-5) page paper in which you:1. Describe the methods for establishing component priorities, including:

a. Business functions and processesb. BIA scenarios and componentsc. Financial and service impact of components not being availabled. Recovery time frameworks

2. Describe the methods for determining component reliance and dependencies, including:

a. Component dependenciesb. Resources required to recover component in the event of failurec. Human assets needed to recover components

3. Provide recommendations for the development of the BIA, management and other personnel responsibilities, and educating company personnel that would be involved in the recovery efforts.

4. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Describe the different ISS policies associated with risk management.

Reference no: EM131999008

Questions Cloud

Discuss why a service line should be implemented : Discuss why a service line should be implemented to increase revenue based on reimbursement changes and current demographic trend in your area.
Ordinary income at the date stock was distributed : How much of the sale price will be subject to long term capital gain treatment? What amount was subject to ordinary income at the date the stock was distributed
Conspiracy affect public opinion about government : Why was President Richard Nixon forced to resign? How did the conspiracy affect public opinion about government?
Explain the method and process that you used : Explain the method and process that you used for uploading and maintaining your assets into the LMS .
Determining component reliance and dependencies : Describe the methods for determining component reliance and dependencies, including: Component dependenciesb. Resources required to recover component.
Womanist and the white feminist movement : What was the relationship between black feminism/womanist and the white feminist movement?
Identify the fundamentals of public key infrastructure : Identify the fundamentals of public key infrastructure (PKI). Describe the manner in which your solution will protect the privacy of data transmitted.
Free south africa movement with african american freedom : Someone help me on how to Compare and contrast tactics used in the Free South Africa movement with the African American Freedom struggle.
How americans viewed authority in era : Do you think that such a description could help to change how Americans viewed authority in this era?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Go online and conduct a search on customer affinity choose

identify and provide the url a web site you visit frequently and identify 3 features of the site that cause you to

  Describe the readability and usefulness of the online user

question 1 discuss the readability and usefulness of the online user manual that you have researched. identify its

  What is the purpose of compensating transactions

Explain any differences that result if we allow multilevel transactions. What is the purpose of compensating transactions? Present two examples of their use.

  Show the simulation code and output

MAP 6264 Homework. Specifically, let W(n) denote the average waiting time (in units of average service time) for those customers who receive service (that is, those customers who do not overflow the buffer) when the capacity of the buffer is n; an..

  Draw the final binary search tree

Read the author's question above, and examine the following write-up to answer this question: is it true as stated; if not, why not?

  How can we determine if maze is constructed correctly

Given a maze drawn in an n × n grid, how can we determine if it is constructed correctly? What is the running time of this algorithm?

  Design an application that declares a purchase object

as you prompt for a sale amount, do not proceed until the user has entered a nonnegative value. After a valid urchase object has been created, display the objects invice number, sale amount, and sales tax.

  Describe common computer- or network-related activity areas

Describe some of the common computer- or network-related activity areas that companies monitor, and the legal or privacy issues associated with that monitoring.

  Create a movie where one item is moving from top to bottom

Write a function to create a movie where one item is moving from the top to the bottom and another item is moving from the bottom to the top.

  Present a proposal to establish information security program

The purpose of this meeting is to present a proposal to establish an information security program at VPP.

  Difference between standard and memory-mapped input-output

What is the basic difference between standard I/O and memory-mapped I/O? Identify the programmed I/O technique used by the PIC18F.

  How to define the Escape Problem

How to  define the Escape Problem

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd