Examine a business continuity plan

Assignment Help Computer Network Security
Reference no: EM133398576

Assignment:

Project Part: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company's data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.

Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.

The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.

For this part of the project:

1. Research BIAs and BCPs.

2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:

  • Critical business functions
  • Critical resources
  • Maximum acceptable outage (MAO) and impact
  • Recovery point objective (RPO) and recovery time objective (RTO)

3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

Reference no: EM133398576

Questions Cloud

Explain why having the access of bootloader : Briefly explain why having the access of bootloader could be utilized for changing/bypassing the root password protection of your Operating System.
How are plicker card used in the classroom : How are plicker card used in the classroom? Why do you think plickers would be beneficial in the classroom?
How old is the device you use most frequently : How old is the device you use most frequently? Do you feel like it is out-of-date and missing features you would like to have?
Components of a database application are you likely to need : Which of the following components of a database application are you likely to need: data entry forms, reports, queries, or application program?
Examine a business continuity plan : Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company's data center.
What restrictions and policies should employers institute : What restrictions and policies should employers institute, and why? Are their risks to employees with BYOD in the workplace, if so what?
Create a plot of the residuals versus the fitted values : In addition, create a plot of the residuals versus the fitted values. What does this plot tell you about the reasonableness of using a linear model here?
Identify suitable entity sets : That means that you have to identify suitable entity sets, relationship sets, attributes, keys of entity sets (if not specified), and so on.
Should we have to certain aspects of others private lives : How much access should we have to certain aspects of others' private lives? For example, should States share criminal databases?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd