Create preventative controls for sungrafix

Assignment Help Computer Engineering
Reference no: EM131230601

Structured Assignment - Preventative Controls 1

https://www.youtube.com/watch?v=heOFkInotII&feature=youtu.be

Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system. Where feasible and cost effective, preventive methods are preferable to actions that may be necessary to recover the system after a disruption. Preventative controls include the identification of effective contingency planning preventive controls and maintaining these controls on an ongoing basis. Identify and incorporate a variety of preventive controls into your BCP. Some of the listed controls are the following:

• Appropriately sized uninterruptible power supplies (UPS) to provide short-term backup power to all system components (including environmental and safety controls);

• Gasoline- or diesel-powered generators to provide long-term backup power;

• Air-conditioning systems with adequate excess capacity to prevent failure of certain components, such as a compressor;

• Fire suppression systems;

• Fire and smoke detectors;

• Water sensors in the computer room ceiling and floor;

• Heat-resistant and waterproof containers for backup media and vital non electronic records;

• Emergency master system shutdown switch;

• Offsite storage of backup media, non-electronic records, and system documentation;

• Technical security controls, such as cryptographic key management; and

• Frequent scheduled backups including where the backups are stored (onsite or offsite) and how often they are recirculated and moved to storage.

Reference no: EM131230601

Questions Cloud

Should it purchase or sell interest rate futures contracts : Assume a financial institution has more rate-sensitive liabilities than ratesensitive assets. - Should it purchase or sell interest rate futures contracts in order to hedge its exposure?
Why do some financial institutions remain exposed : Why do some financial institutions remain exposed to interest rate risk, even when they believe that the use of interest rate futures could reduce their exposure?
What are guidelines available for creating a better query : Database developers have many different options available to them for building more efficient SQL queries. What are the three guidelines available for creating a better query design. Explain those options and the tasks that must be performed by th..
Difference between a long hedge and a short hedge : Explain the difference between a long hedge and a short hedge used by financial institutions. - When is a long hedge more appropriate than a short hedge?
Create preventative controls for sungrafix : Create Preventative Controls for SunGrafix, video game design company. In some cases, outage impacts identified in BIA may be mitigated or eliminated through preventive measures that deter and/or reduce impacts to  system.
Measure- explore and characterize networking issues : Analyze- Undertake a substantive analysis/assessment of networking issues. Measure- Empirically explore and characterize networking issues. Innovate- Devise and analyze (and possibly implement) a new mechanism or technique
Determine whether address variable contains the street name : Write the C++ code to determine whether the address variable contains the street name "Grove Street". Begin the search with the fifth character in the address variable and assign the result to an int variable named subNum variable.
Impact of futures hedge : Explain how the probability distribution of a financial institution's returns is affected when it uses interest rate futures to hedge. What does this imply about its risk?
What is your portfolios beta : If you invest 40 percent of your money in IBM, 30 percent in LUV, and 30 percent in ODP, what is your portfolio's beta?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain a mitigating strategy for the risks

Briefly identify and describe a mitigating strategy for the risks.

  Construct a bcd-to-excess-three-code converter

Construct a BCD-to-excess-3-code converter with a 4-bit adder. Remember that the ex-cess-3 code digit is obtained by adding three to the corresponding BCD digit. What must be done to change the circuit to an excess-3-to-BCD-code converter?

  Write program using array that asks user to input 10 numbers

Write a program using array that asks user to input 10 numbers, then calculates the average of those numbers and finds out the total number that is greater or equal to the average.

  Express the definition of function print of the class two

express the definition of function print of the class two.

  Write down the code to declare a 2d integer array

Write down the code to initialize myary1 beginning with myary1[0][0] = 1 and adding one for each subsequent array location.

  Building an adder and multiplier with mips

Design the algorithm for this adder, implement this algorithm as a sub-routine in MIPS and estimate how long your sub-routine will take based on the instructions it must complete

  Which scanning applicationis better for performing a network

Which scanning applicationis better for performing a network discovery reconnaissance probing of an IP network infrastructure?

  Make a script that uses the following components

design a script that uses the following components: an array, sub procedure, explicit declaration, RUNAT=Server, and a function.

  The origin and history of the sip protocol

Explain, in a couple of paragraphs, the origin and history of the SIP protocol and the H.323 protocol suite. What are the most noticeable characteristics of each. What are some of their cons

  List and describe three possible project risks and how they

q1. what personal characteristic do you think is most important for a cio and why?q2. list and explain three possible

  Why server side computing has been a more affordable

The Cloud, that is synonymous with the internet, became a common phrase which infers that everybody can keep files and records in a trusted site. So what is the difference between uploading a file to a file server and uploading a file to a cloud.

  Crypto device encryption

A foreign navy has implemented the secure communications system where submarine commanders transmit the single 5- letter message every day.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd