Proposal paper | Computer Science homework help
3. A
ue rb ac h P ub lis he rs , I nc or po ra te d. A ll rig ht s re se rv ed . 150 ◾ Information Security Fundamentals economic trends, which depict IT budgets trending downward instead of upward (IndustryWeek 2008). Government Involvement in Business Continuity and Disaster Recovery The goal is not to eliminate the risk but to design business continuity and DR strategies that generate more benefits to the community than the negative effect of the costs incurred (Viscusi and Gayer 2002). This type of cost–benefit analysis and risk- versus cost-based thinking is a critical component to consider when deciding if business continuity and DR strategies should be implemented. Facilitated Business Continuity and Disaster Recovery Theory One scalable and relatively easy way to make sure that all of your business IT departments have a successful DR plan is to leverage the understanding and capa- bilities of the Facilitated Risk Analysis and Assessment Process (FRAAP) and cre- ate your DR teams and methodologies in the same manner as the FRAAP. This includes splitting the workup among the teams, making sure each team has one trained DR specialist/trainer who is responsible for instructing department DR per- sonnel on how to make use of the templates and tools associated with the organiza- tion’s DR efforts. Conclusion My children will live with the mistakes I make. —Representative Zoe Lofgren in a speech on government regulation of DR methods for the Internet Lawsuits are also not the answer to resolving the issue of successful postdisaster recovery, and are actually counterproductive to the goal of maintaining a stable socioeconomic climate that is ripe for successful recovery (Picou et al. 2004). Many of the businesses that suffer a disaster do not have the financial means to recover and continue their operations in the community, and having to pay postdisaster settlement costs will drive them closer toward bankruptcy and not being able to reestablish normal business operations. Peltier, Thomas R.. Information Security Fundamentals, Auerbach Publishers, Incorporated, 2013. ProQuest Ebook Central, http://ebookcentral.proquest.com/lib/apus/detail.action?docID=1375200. Created from apus on 2025-04-18 03:10:32. C op yr ig ht © 2 01