Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

• As IAS professionals, you are facing unprecedented challenges-and opportunities-in the next decade. You are facing a time of increased attention on assets, leadership transition and communication technology innovations.

Hackers are developing methods, by the minute, to access confidential information, steal personally identifiable information (PII) and use it to destroy companies' well-being and peoples' lives.

Omicron Health Care Services (OHCS), is a healthcare provider service company that provides the following services:

• Healthcare provider options.

• Prescription plan services.

• Healthcare professionals.

Scenario

Due to recent natural and man-made disasters that have impacted healthcare technology and operations, the Chief Security Officer, (CSO) Robert Dumbar, has great concerns regarding the continuous operations of the Call Center Services (CCS) and the ability to restore all applications, equipment and data assets ASAP in the event of a natural or man-made disaster.

At the request of the CSO, the IAS Director of OHCS, has organized an internal team to analyze the companies' current Business Continuity / Disaster Recovery Plan (BC/DRP) and develop a formal BC/DRP strategy.

The focus of this request is to develop a BC/DRP strategy for the following departments:

• Data Forensics: Responsible for investigating fraudulent insurance claims; investigating and analyzing devices on a variety of operating systems; conducting complex digital forensic investigations.

• Network Security: Responsible for Wireless/Wired technologies, data engineering, network security controls and testing, data communications and Back-up/recovery processes.

• Healthcare Services: Responsible for customer services, healthcare plans communications and ensuring personal identifiable information is protected.

Phase I:

• Review the OHCS Current State Analysis of BC/DRP strategy media piece in u08s1.

Phase II:

This project will challenge you to create a BC/DRP strategy recommendation report.

• Review the listing of deficiencies identified in the current state analysis.

• Conduct research, exploring other company's BC/DRP strategies including:

o Analysis of the continuous 24/7 operations of Customer Support processes.

o Analysis of the back-up strategy for applications and data.

• Develop recommendations to remediate those deficiencies, supported with references.

• Develop a conclusion on expected results from recommendations and next steps including:

o Whether your company should invest more dollars into the development of a formal BC/DRP strategy plan to:

increase the level of data security and continuous operations of the customer services support processes.

Hire an outside BC/DRP consulting company.

• Create a strategy with your recommendations in the form of a formal report.

• Readings

Use your Essentials of Business Communications text to complete the following:

• Read Chapter 10, "Proposals and Formal Reports," pages 328-339.

Use the Capella library to read the following:

• Cook, J. (2015). A six-stage business continuity and disaster recovery planning cycle. S.A.M.Advanced Management Journal, 80(3), 23-33, 68, 2.

• Lam, W. (2002). Ensuring business continuity. IT Professional Magazine, 4(3), 19-25.

• Lewis, S. (2005). Business Continuity and Disaster Recovery Plans - Things Overlooked. EDPACS 33(1), 19-20.

Attachment:- OHCSstrategy.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92511001

Have any Question?


Related Questions in Management Information System

In class we have discussed web 20 web 30 cloud computing

In class, we have discussed Web 2.0, Web 3.0, Cloud Computing, Mobile Computing, and the Internet of Things. Select an example of one of these four topics (for example, Amazon Web Services or the smart home) and discuss ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

Linux is the best-known and most-utilized open source

Linux is the best-known and most-utilized open source operating framework. As an operating framework, Linux is programming that sits underneath the greater part of the other programming on a PC, getting demands from thos ...

Question 1 osi 7 layer modela what are benefits of using a

Question 1: OSI 7 layer Model. a) What are benefits of using a layered network model? b) Encryption takes place at which layer? c) Flow control takes place at which layer? d) Packets are found at which layer? e) Packet f ...

Singulation is the process by which an rfid reader

"Singulation" is the process by which an RFID reader identifies and communicates with a single RFID transponder. Two singulation methods are tree-walking and an Aloha MAC. Which method is preferable in a densly populated ...

In this assignment you will create a presentation for your

In this assignment, you will create a presentation for your organization to explain how successful collaboration can improve success and provide competitive advantages. Scenario: Your organization has used a variety of c ...

Assignmentpart 1 create a question for a discussion

Assignment Part 1: Create a question for a discussion forum. Create a discussion question based on data warehouse. Part 2: 200-250 words with references Describe one unique and specific example where you would use Nonlin ...

Suppose we have the following context-free grammar which

Suppose we have the following context-free grammar which accepts a list of variable initializations. Goal ::= single | Goal single single ::= VAR "=" exp ";" exp ::= VAR | INT | exp + exp Here each V AR terminal can be m ...

Please answer both questions with 250 words or more with

Please answer both questions with 250 words or more with refs. 1. IT projects are particularly challenging as we are frequently asked for cost and time estimates before we do the Requirements Phase. Write about how IT pr ...

Recent predictions for population growth in the 21st

Recent predictions for population growth in the 21st century are quite different from predictions made several decades ago. Find reports of older population model (say from 1960s, 1970s, or 1980s), and find reports of re ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As