Identify the steps an organization should take to recover

Assignment Help Management Information Sys
Reference no: EM132207364

Case Study : Disaster Recovery

Read the following articles:

"If data is the new oil, then Equifax just caused a huge environmental disaster."

"Using Credit Reporting Agency Data To Assess the Link Between the Community Reinvestment Act and Consumer Credit Outcomes."

"Managing in a Post-9/11, Post Katrina World: An Introduction to a Disaster-recovery Planning for Technical Communicators" (Located in the course shell.)

"Recovering from Database Recovery: Case Studies and the Lessons They Teach" (Located in the course shell.)

Note: Include these four (4) articles in your references section. These four (4) articles do not count towards the required number of references.

After reading these articles, consider the following:

The need for an organization to have a disaster recovery plan.

How the attacks of September 11, 2001 affected Barclay's Capital and Putman Investments. Did that impact Equifax disaster recovery plan? How?

Whether or not Equifax had a disaster recovery plan. If so, what were the parts of the plan that allowed it to continue operations? If not, what should a disaster recovery plan have included in order to continue operations?

Write a three to four (3-4) page paper in which you:

Identify the steps an organization should take to recover from a disaster and resume the business operations to normal mode

Suggest two (2) methods that organizations can use in order to mitigate the risk of data loss

Suggest two (2) methods that organizations can use in order to minimize the impact on personnel after a disaster

Examine Equifax situation. Determine two (2) factors that contributed to a successful disaster recovery and two (2) factors that hindered a successful disaster recovery for the organization

Use at least three (3) quality references published within the past [1] year in this assignment

Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length

The specific course learning outcomes associated with this assignment are:

Examine the challenges of computer security, including different threats and types of attacks.

Use technology and information resources to research issues in cryptography published within the past [1] year.

Write clearly and concisely about cryptography using proper writing mechanics and technical style conventions.

Reference no: EM132207364

Questions Cloud

How mortgage securitisation has contributed : Demonstrate to Karen Diet how mortgage securitisation has contributed to the global economic crisis.
What is the IRR for this project : You will be able to reduce working capital by $110,000 (this is a one-time reduction). If the tax rate is 35 percent, what is the IRR for this project
What is history : What is history
Examine the different types of applications of the stream : Examine the different types of applications of the stream cipher and the block cipher.
Identify the steps an organization should take to recover : How the attacks of September 11, 2001 affected Barclay's Capital and Putman Investments. Did that impact Equifax disaster recovery plan? How?
Explain the role of ethics in negotiations : Explain the role of ethics in negotiations. Evaluate the win-win approaches to negotiations that watch for the best interests of both parties.
Which items might substitute for another : By having an understanding of the product life cycle, businesspeople can make savvy marketing choices. What is a popular item today that you've seen go through.
Evaluate and present the impacts of the resources : Your employer has been going through many challenges this past eighteen months due to the recent financial crises. There has been major challenges throughout.
Analyze the main ethical principles to research : Identify and Critically Analyze the 5 Main Ethical Principles to Research - In addition to these specified resources, other appropriate scholarly resources

Reviews

Write a Review

Management Information Sys Questions & Answers

  How companies could effectively use emerging technology

How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required.

  Create a vpn connectivity troubleshooting checklist

You have been working as a technology associate in the information systems department at Corporation Techs for two months.

  Identify the elements of good data backup planning

Define, describe and identify the elements of (a) good Data Backup Planning, (b) good Disaster Recovery Planning, and (c) good Business Continuity Planning.

  List two semi-structured interview questions

Assume you are the information systems manager at a community clinic in the Kingdom of Saudi Arabia that currently is completely paper-based.

  Choose a strategy for addressing the associated risk

Choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

  Write a response paper about the forensic labs and its tools

Forensic labs require a variety of tools and assets in order to accommodate numerous investigations and evidence possibilities that might be encountered.

  Choose a business factor to narrow the scope of research

Use one area of interest from your area of specialization - Choose a business factor to further narrow the scope of your research

  Discuss at least five policies you would implement

Access control is needed for networks, applications, databases, physical access, files, and so on.

  Requirements of the sarbanes oxley act

In a one- to two- page paper (not including the title and reference pages), explain what the staff should expect the auditors to do. Be sure to include the requirements of the Sarbanes Oxley Act in your explanation.

  Define the elements of establishing e-procurement

Define the elements of establishing E-Procurement with the commodity supplier. Identify the challenges of implementing and maintaining an E-Procurement system and recommend mitigation actions.

  Identify the necessary components within a policy

Identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare.

  What is the probability that the shop is empty

What is the probability that the shop is empty?- What is the average number of customers in the barbershop?- What is the average time spent in the shop?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd