Describe the main objectives of the anba drp

Assignment Help Computer Network Security
Reference no: EM13892960

Disaster Recovery Plan

This assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP analysis. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Acme National Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY, Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has workstations or terminals that are connected to a central data center located in Chicago, IL. Each branch also has local servers and desktop computers that are not connected to the central data center.

Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:

Malfunctioning software

Workstations and servers malfunctions

Failed hard drives

Large-scale natural disasters such as hurricanes and earthquakes

Office fires

Computer virus outbreaks

Power outages caused by winter storm

Terrorist attacks

Section 1: Disaster Recovery Plan

Modify the template to create a Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate information for the areas outlined in the DRP template.

Section 2: Disaster Recovery Plan Analysis

2. Write a five to seven (5-7) page paper in which you:

Describe the main objectives of the ANBA DRP.

Explain the key ways that ANBA''s DRP can help mitigate risk in the organization.

Defend the need for DRPs in an enterprise organization such as ANBA.

Infer on the difference between the elements of DRP between different branches of a multinational organization.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.

Use technology and information resources to research issues in IT risk management.

Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Verified Expert

Reference no: EM13892960

Protect the system from these procedural attacks

Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of

Identify at least two criminology theories

Motive is one of the main themes that law enforcement must identify in order to prevent future crimes. Law enforcement utilizes the science of criminology to understand crimin

Describe the process of performing a risk assessment

Recommend the key method(s) for determining the risk appetite of the company. Describe the process of performing a risk assessment. Elaborate on the approach you will use when

Analyze the header files of spams

Analyze the header files of spams. The file is a collection of spams received by someone during 1998 March (, other spam archives could

Introduction to network engineering

1. What was the main difference between 1G and 2G cellular systems? 2. Discuss the technological evolution from circuit switching to packet switching in cellular telephony.

Describe possible liability issues

Describe regulatory requirements and describe possible liability issues that may be related to these cyberattacks. How should cyber policy controls be adjusted for each orga

Company financial embezzlement cases

Article topic ideas: Information breaches (these will be the vast majority), disgruntled employee cases involving data theft or leaking of information and company financial e

Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, a


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd