Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system.

Where feasible and cost effective, preventive methods are preferable to actions that may be necessary to recover the system after a disruption.

Preventative controls include the identification of effective contingency planning preventive controls and maintaining these controls on an ongoing basis.

Identify and incorporate a variety of preventive controls into your BCP

Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls);

Gasoline- or diesel-powered generators to provide long-term backup power;

Air-conditioning systems with adequate excess capacity to prevent failure of certain components, such as a compressor;

Fire suppression systems;

Fire and smoke detectors;

Water sensors in the computer room ceiling and floor;

Heat-resistant and waterproof containers for backup media and vital non electronic records;

Emergency master system shutdown switch;

Offsite storage of backup media, non-electronic records, and system documentation;

Technical security controls, such as cryptographic key management; and

Frequent scheduled backups including where the backups are stored (onsite or offsite) and how often they are recirculated and moved to storage.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92430178

Have any Question?


Related Questions in Management Information System

Ch 7 control and accounting information systemson the other

Ch. 7: Control and Accounting Information Systems On the other hand, the evidence of fraud here seems strong. If this kind of behavior is not penalized, then the perpetrators may be encouraged to do itagain, with future ...

1 relate state government data security breach notification

1. Relate state government data security breach notification laws to individual privacy. 2. Explain why state governments have data security breach notification law. 3. Find your state or location's data and security bre ...

Question describe and discuss at least two backup

Question : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? Please write minimum of 250 words with 0 % plagiarism and in APA format.

Team assignment team and team performance evaluation300

Team Assignment : Team and Team Performance Evaluation. 300 Words per each Topic and 2 references per topic 1) Present a discussion of what team is. What type(s) of team do you have in your organization? 2) What is meant ...

Write two-page 1000 words paper1 articulate your own point

Write two-page [1000 words] paper: 1. Articulate your own point of view on how the network neutrality issue should be addressed and regulated? 2. What are the effects of the current network neutrality regulations on the ...

Please answer each question and cite any sources used1

Please answer Each question, and cite any sources used. 1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen. How does the the approach of inf ...

Leadership paradox and inter-team relationsa what is

Leadership Paradox and Inter-team Relations A. What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your ...

Agile project management has gained popularity in the

Agile project management has gained popularity in the software development industry in recent years. In this assignment, you must discuss the core values and principles of Agile project management. In addition, you must ...

Taskyour team task is to address two network security

Task: Your team task is to address two network security problems that this organization's network faces and use scholarly research to help document the findings. Preparing your paper: Your team makes up the nature of Sou ...

Discussion one of the challenges of big data and the use of

Discussion : One of the challenges of big data and the use of it to solve problems is understanding the context and quality of the data being used. This is particularly true when internal data is integrated with external ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As