Proposal paper | Computer Science homework help

3. A

ue rb ac h P ub lis he rs , I nc or po ra te d. A ll rig ht s re se rv ed . Disaster Recovery and Business Continuity Planning ◾ 149 postevent recovery. In some postevent cases, we can even go as far as to say that “managerial errors are the root causes of the technological disasters” (Shaluf 2007, p. 387). Developing the Contingency Policy One of first items that information assurance/security professionals need to do to ensure that their organization is going to take the necessary precautions to make sure that if a disaster occurs they will be ready and prepared to recover is to develop a Business Continuity Contingency Policy. As is true with any policy, vetting and alignment with organizational senior management is the first thing that needs to take place. Once this approval of the policy takes place, it then needs to proceed through an organizational governance process to ensure that proper buy-in from the affected community members’ takes place. The activities during this time will be ongoing review, edit, review, and finally acceptance and alignment. The vetting of organizational policies should also make sure to include review by the organiza- tion’s general counsel. When finalizing the policy, keep in mind that 100% align- ment is not usually possible and the organizational governance process should take that into account. Business Impact Analysis A discussion on BIA and a sample procedure are included in Appendix B. Controls and Mitigation Bergland and Pedersen (1997), in a report on the effects of safety regulation on the safety and well-being of Norwegian fisherman, found that costly regulation induced “the individual rational fisherman to behave in a way which increases their risks” of injury (p. 291). This behavior is caused by a fundamental risk analysis being conducted on the part of the regulated entity. Will it cost me more to follow the regulation than it will to suffer the accident or loss caused by a negative event? Extrapolating that risk analysis to the area of business continuity and DR planning, it is feasible to believe that senior business managers in other industries will con- duct similar analyses. Will it cost me more to implement the required business con- tinuity and DR infrastructure than it would for me to recover from a catastrophic event that may or may not occur sometime in the future? This is an impactful ques- tion that needs to be fully considered in our current economy downtrend that is causing organizations to pull back from IT spending and is in line with the current Peltier, Thomas R.. Information Security Fundamentals, Auerbach Publishers, Incorporated, 2013. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=1375200. Created from apus on 2025-04-18 03:10:32. C op yr ig ht © 2 01

5,878views
4.5
(245 ratings)

Related Study Guides

3 Assignment Remote Work Environments in a Global Corporation. | CSIS 343 - Cybersecurity

3. Endpoint Security Measures: Propose endpoint security measures to ensure the security of devices used for remote work. Discuss strategies for securing both corporate-owned and employee-owned device...

computer-sciencepolitical-science

Assignment 6 Security Awareness Program for a Small Business | CSIS 343 - Cybersecurity

3. Develop guidelines for secure remote work practices, considering the increasing trend of remote work. Discuss strategies for securing remote connections, using virtual private networks (VPNs), and...

human-resourcescomputer-science

Business intelligence its-531: week2 assignment | Computer Science homework help

Business intelligence ITS-531: week2 assignment vutukuriweek 2 assignment: Complete the following assignment in "one MS Word document": Chapter 3: exercise 12 - Go to "data.gov" — a U.S. government–sp...

economicscomputer-science

Bi: week 5 assignment | Information Systems homework help

BI: Week 5 Assignment kgf_rocky_bhaiComplete the following assignment in one MS word document: Chapter 5 – Discussion Question #1 Go to the Teradata University Network Web site (teradatauniversitynetw...

computer-scienceart-design

Discussion and replies | Computer Science homework help

2. Discuss some common strategies and pitfalls you have seen with disaster recovery plans. Replies In 400 words total, replying to the two posts below. Each reply must be 200 words for post 1 and post...

communicationpolitical-science

Grca march 1 2025 | Computer Science homework help

136. https://www.proquest.com/scholarly-journals/effect-prenatal-care-delivery-models- targeting/docview/2507722229/se-2 Nichols, C. R., & Cohen, A. K. (2021). Preventing maternal mortality in the Uni...

political-sciencestatistics

Assignment 3 comprehensive set of security measures | CSIS 343 - Cybersecurity

4. Propose strategies for securing application programming interfaces (APIs) used in the software development process. Discuss the importance of authentication, authorization, and encryption in API se...

human-resourcespolitical-science

Assignment 5 Cloud-Native Application Security for a Tech Startup | CSIS 343 - Cybersecurity

4. Additional Security Considerations 4.1. Third-Party Dependencies: Evaluate third-party dependencies used within your serverless functions. Ensure that libraries and modules are kept up to date to p...

art-designcomputer-science

Need Help With A Similar Question?

Our experts deliver perfect solutions with guaranteed A+ grades

A+
Student Grade
98%
Success Rate
12h
Delivery Time
Join 1,000+ students who got their perfect solutions
Rated 4.9/5 by satisfied students

Need Help With This Question?

Academic Expert

Subject Matter Specialist

98%
Success Rate
24/7
Support

Why Students Trust Us

  • PhD-Level Expertise
  • Original Work Guarantee
  • Better Grade or Free

"Got an A+ on my assignment. Exactly what I needed!"

Recent Student