Identify the critical business functions

Assignment Help Computer Engineering
Reference no: EM133459954

Question 1: Business Impact Analysis (BIA)

The BIA is explained with examples in chapter 12. Specifically, there is a good example starting on page 304 that walks you through this process.

For this week's discussion, select a place of business that you visit or use on a frequent basis. This could be a coffee shop, restaurant, website, etc. During the Live Session this week, we will walk through an example of this.

Provide the following:

  • Background: Provide a short background on the place of business you choose.
  • Identify the Critical Business Functions (2 functions). Please keep these as non-IT business functions.
  • Identify the Critical Resources (at least three per function). These should be IT resources
  • Identify the MAO (Maximum Acceptable Outage) and Impact for each of the critical resources identified.
  • Identify Recovery Requirements for each of the critical resources identified.

Question 2: After reading Chapter 13 on Business Continuity Plans (BCPs), assume you work for a company in Florida with eight locations spread across the state. The company has never been impacted by a natural disaster or a cyberattack. The IT manager meets with the company president to explain the business continuity plan she is preparing. The president does not believe the company needs a BCP and does not want the time or expense spent on the project.

Answer the following question(s):

1. Do you believe a BCP is necessary in this situation? Why or why not?
2. What is the worst-case scenario if the company does not have a BCP in place?

 

Reference no: EM133459954

Questions Cloud

Describe a new business for which you think a virtual : Describe a new business for which you think a "virtual organization"—which has no physical office or headquarters— could be an effective design.
What types of malware could cause these symptoms : What steps can you take to check whether this has occurred? If you do identify malware on your PC, how can you restore it to safe operation?
What degree do you think the creativity of an organization : what degree do you think the creativity of an organization is a function of the creativity of the employees themselves rather than the structure, routines
Research vlan configurations for manufacturing companies : Research VLAN configurations for manufacturing companies. simple diagram showing an appropriate VLAN configuration. In a separate Word document describe
Identify the critical business functions : Background: Provide a short background on the place of business you choose. Identify the Critical Business Functions (2 functions). Please keep these as non-IT
Components of the system : Components of the system that make it successful How this system differs from the system of the United States?
Talk about sustainable development goals : Talk about Sustainable Development Goals: No Poverty, Responsible consumption and production, and lastly Reduced inequalities.
List three applications of web-accessible smart devices : List three applications of "web-accessible smart devices" in the new hospital that you would recommend for this business case.
Communications manager at major corporation : Imagine you are a communications manager at a major corporation. One of your new team members has sent out an email to a diverse group of project managers

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd