Developing deployment proposal

Assignment Help Basic Computer Science
Reference no: EM131086013

Developing Deployment Proposal

Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating process. A very good investment recommendation may not receive stakeholder's support and subsequent approval for resources to implement it if it is not communicated effectively. Therefore, you should be conversant in presenting your recommendation to the stakeholders in a convincing manner.

To prepare for the Project in this unit:

  • Download the Sample Presentation Template located in the Learning Resources for this unit.
  • Consider that you are communicating to the CIO-level audience; your presentation should be technical and provide a business case for your proposed project to address the gap you identified in the identity and access management area, but it should also be to the point.

For the Project in this unit, use the results of your previous identity and access management tool evaluation and present those results to the management of your chosen organization. Prepare a PowerPoint presentation (12-15 slides), summarizing the results of your evaluation. Use the template provided with the Learning Resources in this unit to prepare your presentation. You may make limited modifications to the template in order to make your presentation effective.

Required Resources Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. 
    In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164
    In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html
    In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086013

Questions Cloud

Netbeans integrated development environment : Create a console based, non-GUI Java program using NetBeans Integrated Development Environment (IDE) that displays "Hello world!" Take a screenshot that shows the program's successful compilation and execution.
Piece of equipment or materials : This is to avoid allegations that the evidence may have been tampered with when it was unaccounted for, and to keep track of the tasks performed in acquiring evidence from a piece of equipment or materials. What is the term used to describe this p..
Loss of productivity and significant costs : Interruptions to business functions can result in a loss of productivity and significant costs. Careful planning can often help avoid security incidents. However, even with planning, such incidents cannot always be prevented. Therefore, as a secur..
At what distance is the concentration of microorganisms : At what distance is the concentration of microorganisms equal to 1 ppm?
Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a program that calculates change after a purchase

Create a program that calculates change after a purchase. This will be a sequential algorithm, which is one of the simplest programming patterns. Your solution requires no branching or looping. Simply write a series of statements that will exec..

  Rewrite code especially for each type of hardware platform

Portability is the ability of software to move easily from one hardware platform to another. UNIX was the first portable operating system, allowing programs to compile on multiple hardware platforms without the need for the programmer to rewrite code..

  Write a code using greedy best first search

Write a code using Greedy Best First Search and A* in Java language to find the shortest path in Romania path to Bucharest

  Sheet to print as an attendance report for administration

In this project, you will work on an attendance log for a 16-week college course. For one section of the course, you will set up the sheet to print as an attendance sign-in sheet.

  How does the name server hierarchy relate to zone hierarchy

how does the name server hierarchy relate to the zone hierarchy? How do you deal with the fact that each zone may have multiple name servers?

  Question regarding the role based access control

You work as the security administrator at TestKing.com. TestKing has a RBAC (Role Based Access Control) compliant system for which you are planning the security implement-tation. There are three types of resources including files, printers, and ma..

  Create a new group called mygroup

Directions: As you complete each of the following steps, keep track of what occurs at each point, including what you type, the output given, and if you experience any errors.

  Analyze use of digital signatures to validate device drivers

Analyze the use of digital signatures to validate device drivers. Describe a situation where it is necessary to bypass this protection. Justify your response.

  Differences and similarities of the business models

Recognize differences and similarities of the business models, taking into account the following factors: Who is the target audience for this Web site.

  Write a program in c++ for a server

Write a program in C++ for a server (called math solver) which solves three math problems: factorial (i.e. n!), exponent with base 2 (i.e. 2n), and cube (i.e. n3).

  Estimate the probabilities of finding two messages

However, the approximation in the hint there for simplifying the product fails rather badly now. So, instead, take the log of each side and use the approximation log(1 - k/2 128) ≈ -k/2 128 .

  Determine probability that selected cobalt gets more miles

Standard deviation 3.5 miles per gallon. Determine the probability that the randomly selected Cobalt gets more than 34 miles per gallon.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd