Developing deployment proposal

Assignment Help Basic Computer Science
Reference no: EM131086013

Developing Deployment Proposal

Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating process. A very good investment recommendation may not receive stakeholder's support and subsequent approval for resources to implement it if it is not communicated effectively. Therefore, you should be conversant in presenting your recommendation to the stakeholders in a convincing manner.

To prepare for the Project in this unit:

  • Download the Sample Presentation Template located in the Learning Resources for this unit.
  • Consider that you are communicating to the CIO-level audience; your presentation should be technical and provide a business case for your proposed project to address the gap you identified in the identity and access management area, but it should also be to the point.

For the Project in this unit, use the results of your previous identity and access management tool evaluation and present those results to the management of your chosen organization. Prepare a PowerPoint presentation (12-15 slides), summarizing the results of your evaluation. Use the template provided with the Learning Resources in this unit to prepare your presentation. You may make limited modifications to the template in order to make your presentation effective.

Required Resources Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. 
    In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164
    In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html
    In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086013

Questions Cloud

Netbeans integrated development environment : Create a console based, non-GUI Java program using NetBeans Integrated Development Environment (IDE) that displays "Hello world!" Take a screenshot that shows the program's successful compilation and execution.
Piece of equipment or materials : This is to avoid allegations that the evidence may have been tampered with when it was unaccounted for, and to keep track of the tasks performed in acquiring evidence from a piece of equipment or materials. What is the term used to describe this p..
Loss of productivity and significant costs : Interruptions to business functions can result in a loss of productivity and significant costs. Careful planning can often help avoid security incidents. However, even with planning, such incidents cannot always be prevented. Therefore, as a secur..
At what distance is the concentration of microorganisms : At what distance is the concentration of microorganisms equal to 1 ppm?
Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Composite and multivalued attributes can be nested

Composite and multivalued attributes can be nested to any number of levels. Suppose we want to design an attribute for a STUDENT entity type to keep track of previous college education.

  Program that generates a 6-by-6 two-dimensional matrix

Write a program that generates a 6-by-6 two-dimensional matrix filled with 0s and 1s, displays the matrix, and checks if every row and every column have an even number of 1s.

  Part of the hipaa privacy rule

True or Flase. As a patient, your doctor must sign a HIPAA Consent and Release Form to share your ePHI or PHI with insurance providers who pay for your medical bills. This is part of the HIPAA Privacy Rule.

  You are to design and construct a 3-bit synchronous counter

You are to design and construct a 3-bit synchronous counter with an enable (EN) input. The counter is to count in the prescribed squence shown below if EN is true at the next active clock transition

  Nscs pillars of scholarship

Design an NSCS chapter event you would like to attend. Explain how it relates to the NSCS pillars of scholarship, service and integrity. (Please respond in 300-450 words) (https://www.facebook.com/nscs.asu)/ (https://www.facebook.com/nscs94) --The..

  Expected cost of an unsuccessful search

Under certain assumptions, the expected cost of an insertion into a hash table with secondary clustering is given by 1/(1-λ)-λ-ln(1-λ). Unfortunately, this formula is not accurate for quadratic probing. However, assuming that it is, determine the ..

  Explain how cloud-based data storage works

Explain how cloud-based data storage works. What factors you consider when selecting a vendor for a cloud-based storage solution for your company

  Calculate the total income and substitution effects

Xiao-Ping has 24 hours a day to divide between work and leisure, and her boss allows her to work as many hours as she wants.  She has $8 per day of non-labor income, and she works at a job that pays $8 per hour. Her preferences over leisure time R ? ..

  Identify the basic operation of the following algorithm

Identify the basic operation of the following algorithm (that takes as input an array A[0... n-1] of n integers) and analyze its worst-case time complexity.

  Opencv python

OpenCV Python

  What is dns

1. How would you organize a network for an organization that had five departments? Where would you place the servers, both physically and logically? Specify the types of servers (e-mail, web, application, database, etc.) and provide some justific..

  Discuss how determining milestones might add additional

Remember that milestones normally have no duration, so you must have tasks that will lead to completing the milestone.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd