Describe the main objectives of the anba drp

Assignment Help Computer Network Security
Reference no: EM13892960

Disaster Recovery Plan

This assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP analysis. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Acme National Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY, Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has workstations or terminals that are connected to a central data center located in Chicago, IL. Each branch also has local servers and desktop computers that are not connected to the central data center.

Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:

Malfunctioning software

Workstations and servers malfunctions

Failed hard drives

Large-scale natural disasters such as hurricanes and earthquakes

Office fires

Computer virus outbreaks

Power outages caused by winter storm

Terrorist attacks

Section 1: Disaster Recovery Plan

Modify the template to create a Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate information for the areas outlined in the DRP template.

Section 2: Disaster Recovery Plan Analysis

2. Write a five to seven (5-7) page paper in which you:

Describe the main objectives of the ANBA DRP.

Explain the key ways that ANBA''s DRP can help mitigate risk in the organization.

Defend the need for DRPs in an enterprise organization such as ANBA.

Infer on the difference between the elements of DRP between different branches of a multinational organization.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.

Use technology and information resources to research issues in IT risk management.

Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Verified Expert

Reference no: EM13892960

Discuss a case study on your chosen it system

BN203: Network Security/Overview of Network Security Identify three (3) security vulnerabilities in the chosen case study and discuss how these threats can be mitigated using

Analyse potential attacks and give a method of prevention

Write a key exchange protocol for A and B to share a symmetric key. Analyse potential attacks and give a method of prevention and write a key exchange protocol for A and B to

Overview of cybersecurity framework

Look at the overviews of CobIT, ISO 27001, and the NIST cybersecurity framework How are they similar - How are they different? Which would you feel is more effective if you

Security through obscurity in a computer situation

Give an example of security through obscurity in a computer situation. Give an example of security through obscurity in a situation not involving computers. Is security thro

The difference root cause analysis and simply identifying

It is important to identify what issues will be targeted before revision can begin in the upcoming Innovate phase. In the Understand phase, you conduct root cause analysis,

Issues involved in the information systems security

Information Systems Security - ARUMSC2IIS Critically evaluate concepts, principals and practice in the area of information systems security - Demonstrate an in-depth understan

Briefly analyse the candidates - mac, dac and rbac

Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on th

Create a network diagram illustrating the solutions

Write a cumulative 4- to 5-page paper (not including any diagrams or charts) incorporating your prior work. Solve the design problems of your organization. Create a network

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd