Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question: Term Paper: Contingency Planning in Action

Create a hypothetical organization with details including geographic location(s), number of employees in each location, primary business functions, operational and technology details, potential threats to the business and its technology, and anything else that you believe is relevant to the business.

Assume this organization is lacking in its contingency planning efforts and requires assistance in ensuring these efforts are appropriately addressed to increase its overall security and preparedness posture.

Write a ten to fifteen (10-15) page paper in which you:

1. Provide an overview of the organization and indicate why contingency planning efforts are needed and how these efforts could benefit the business.

2. Develop a full contingency plan for the organization. Include all subordinate functions / sub plans, including BIA, IRP, DRP, and BCP efforts.

3. Determine the policies and procedures that would be needed for all contingency planning efforts. Detail the role of the policy / procedure, and explain how each would help achieve the goals of these efforts.

4. Detail the processes to utilize in order to fully implement the contingency plan and its components, and explain the efforts to consider in maintaining the plans.

5. Create a hypothetical incident scenario where the contingency planning efforts would need to be utilized and detail: a. How the plan is sufficiently equipped to handle the incident. b. a timeline for the incident response and recovery efforts.

6. Identify any ethical concerns that are specific to this organization and its incident response personnel (especially the CP Team Leader), and explain how to plan for these concerns.

7. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

8. Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• The specific course learning outcomes associated with this assignment are:

• Explain risk management in the context of information security.

• Develop a disaster recovery plan for an organization.

• Summarize the various types of disasters, response and recovery methods.

• Compare and contrast the methods of disaster recovery and business continuity.

• Explain and develop a business continuity plan to address unforeseen incidents.•Describe crisis management guidelines and procedures.

• Describe detection and decision-making capabilities in incident response.

• Develop techniques for different disaster scenarios.

• Evaluate the ethical concerns inherent in disaster recovery scenarios.

• Use technology and information resources to research issues in disaster recovery.

• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92848825
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Suppose that you have a singly-linked list l containing the

Suppose that you have a singly-linked list L containing the sequence of numbers (1,2,3,4,5,6,7,8,9). Suppose further that you have an initially empty stack S. i) Give a pseudo-code description of a method that uses only ...

Question how will you create the cicd process for this

Question: How will you create the CI/CD process for this application? Propose the tools, technologies required to achieve CI/CD in general. The response must be typed, single spaced, must be in times new roman font (size ...

Question suppose you are tasked with designing the security

Question : Suppose you are tasked with designing the security system for a new web browser that supports rendering web pages with embedded web page scripts. What checks would you need to implement to ensure that executin ...

Identify at least two 2 factors that have led to the

Identify at least two (2) factors that have led to the explosive growth of digital crime over the past a few decades. Next, describe the most common forms of digital crime, and give your opinion as to why those forms you ...

Take screenshots of functions running in clisplet x1 x2 xn

Take screenshots of functions running in cLISP, Let x1, x2, ...xN be a set of input features. A linear function that represent those features, will have a following form: Fw(x1, x2, .. xn)= w0 + w1 * x1 + w2 * x2 +... + ...

Single purpose processors design the sequence recognizer

Single Purpose Processors Design the sequence recognizer for 110. Perform the following steps: - 1. the state diagram - 2. the state table -K-map - 3. Simplification of the function by using the K-map -Circuit (logic dia ...

This is a simple exercise to introduce the use of arrays

This is a simple exercise to introduce the use of arrays and some of the common errors that occur when programming with them in c++. • Write a simple program that allows the user to enter 10 integers into an array, then ...

Roberto is the network administrator for an international

Roberto is the network administrator for an international law firm with offices and customers in North America, South America, Africa, and the Middle East. The lawyers frequently contact each other via e-mail, use the In ...

Using the following dataa sex- 7 males 1 female height-

Using the following data, A.) (Sex)- 7 males, 1 female. (Height)- 72,67,72,64,66,68,68,70. (Left or right handed)- 7 right handed, 1 left handed. Let's assume our class is truly representative of the population at large. ...

Please elaborate your understanding about how rfid and nfc

Please elaborate your understanding about how RFID and NFC work. What are the current security considerations and challenges?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As