Identify the critical business functions

Assignment Help Computer Engineering
Reference no: EM133459954

Question 1: Business Impact Analysis (BIA)

The BIA is explained with examples in chapter 12. Specifically, there is a good example starting on page 304 that walks you through this process.

For this week's discussion, select a place of business that you visit or use on a frequent basis. This could be a coffee shop, restaurant, website, etc. During the Live Session this week, we will walk through an example of this.

Provide the following:

  • Background: Provide a short background on the place of business you choose.
  • Identify the Critical Business Functions (2 functions). Please keep these as non-IT business functions.
  • Identify the Critical Resources (at least three per function). These should be IT resources
  • Identify the MAO (Maximum Acceptable Outage) and Impact for each of the critical resources identified.
  • Identify Recovery Requirements for each of the critical resources identified.

Question 2: After reading Chapter 13 on Business Continuity Plans (BCPs), assume you work for a company in Florida with eight locations spread across the state. The company has never been impacted by a natural disaster or a cyberattack. The IT manager meets with the company president to explain the business continuity plan she is preparing. The president does not believe the company needs a BCP and does not want the time or expense spent on the project.

Answer the following question(s):

1. Do you believe a BCP is necessary in this situation? Why or why not?
2. What is the worst-case scenario if the company does not have a BCP in place?

 

Reference no: EM133459954

Questions Cloud

Describe a new business for which you think a virtual : Describe a new business for which you think a "virtual organization"—which has no physical office or headquarters— could be an effective design.
What types of malware could cause these symptoms : What steps can you take to check whether this has occurred? If you do identify malware on your PC, how can you restore it to safe operation?
What degree do you think the creativity of an organization : what degree do you think the creativity of an organization is a function of the creativity of the employees themselves rather than the structure, routines
Research vlan configurations for manufacturing companies : Research VLAN configurations for manufacturing companies. simple diagram showing an appropriate VLAN configuration. In a separate Word document describe
Identify the critical business functions : Background: Provide a short background on the place of business you choose. Identify the Critical Business Functions (2 functions). Please keep these as non-IT
Components of the system : Components of the system that make it successful How this system differs from the system of the United States?
Talk about sustainable development goals : Talk about Sustainable Development Goals: No Poverty, Responsible consumption and production, and lastly Reduced inequalities.
List three applications of web-accessible smart devices : List three applications of "web-accessible smart devices" in the new hospital that you would recommend for this business case.
Communications manager at major corporation : Imagine you are a communications manager at a major corporation. One of your new team members has sent out an email to a diverse group of project managers

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a class that maintains scores for a game application

Write a class that maintains the scores for a game application. Implement the addition and removal function to update the database.

  What is a salt in the context of unix password management

What is a salt in the context of UNIX password management? List and briefly define four techniques used to avoid guessable passwords.

  A program to print the average test score to the screen

Write a program that prompts the user to enter five test scores and then print the average test score to the screen.

  What are the different phases involved in sdlc

The systems development lifecycle (SDLC) provides a standardized process for all phases of any system development.

  Provide an example of a class of markov networks

Provide an example of a class of Markov networks Hn over n nodes for arbitrarily large n (not necessarily for every n), where the size of the largest clique.

  What is the maximum rate

assume an 802.11b station is configured to always reserve the channel with the RTS/CTS sequence. Suppose this station suddenly wants to transmit 1,000 bytes of data, and all other stations are idle at this time.

  How to do a search using google search engine

Exclude a search term by adding a hyphen before the word, especially useful when searching a word with several meanings.

  Value that the user is entering is valid

COM 123 Loretto Abbey Catholic Secondary School centimeter measurement and converts it to 5 other measurements, such as inches or yards. Or takes the number

  Add a method to the program that calculates the cube

Add a method to the program that calculates the cube of every number between a lower bound and an upper bound that a user inputs.

  Express and give an example of a web database.

Explain the difference between system design and system analysis.

  What are the benefits of linked structure

What are the benefits of linked structure? What are the drawbacks of linked structure? What are differences between singly linked and doubly linked structures?

  Give important aspect of an operating system

What is the the most critical or useful function provided by an operating system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd