Describe the main objectives of the anba drp

Assignment Help Computer Network Security
Reference no: EM13892960

Disaster Recovery Plan

This assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP analysis. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Acme National Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY, Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has workstations or terminals that are connected to a central data center located in Chicago, IL. Each branch also has local servers and desktop computers that are not connected to the central data center.

Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:

Malfunctioning software

Workstations and servers malfunctions

Failed hard drives

Large-scale natural disasters such as hurricanes and earthquakes

Office fires

Computer virus outbreaks

Power outages caused by winter storm

Terrorist attacks

Section 1: Disaster Recovery Plan

Modify the template to create a Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate information for the areas outlined in the DRP template.

Section 2: Disaster Recovery Plan Analysis

2. Write a five to seven (5-7) page paper in which you:

Describe the main objectives of the ANBA DRP.

Explain the key ways that ANBA''s DRP can help mitigate risk in the organization.

Defend the need for DRPs in an enterprise organization such as ANBA.

Infer on the difference between the elements of DRP between different branches of a multinational organization.

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Create a disaster recovery plan (DRP) based on the findings of a given risk assessment for an organization.

Use technology and information resources to research issues in IT risk management.

Write clearly and concisely about topics related to IT risk management using proper writing mechanics and technical style conventions.

Verified Expert

Reference no: EM13892960

Questions Cloud

Difference between automobile club claim and disbelieving : An automobile club claims that the average time for a non-stop trip from new york city to Washington, D.C. by automobile is 4.5 hours. A disbelieving driver feels that the claim is incorrect.
How many bones is there in an infant babys body : How many bones is there in an infant babys body? anatomy question
What is transportation in operating management : What is transportation in Operating management? How does it work
Identify five causes of distress in workplace and explain : Please identify and describe five ways in which we can cope/deal with stress through mindfulness methods/approaches, in other words, ways that help us center/focus to be in the moment. Please identify five causes of distress in the workplace and e..
Describe the main objectives of the anba drp : Explain the key ways that ANBAs DRP can help mitigate risk in the organization and defend the need for DRPs in an enterprise organization such as ANBA.
Obtain information to address a given situation : Please propose a marketing research plan to obtain information to address a given situation. (For example, a research plan to understand student's preferences for a coffee shop or a hangout, in order to launch your own business).
What are advantages of using linked list instead of a vector : What is the difference between a class template and a template class? What are the advantages and disadvantages of using a linked list instead of a vector?
Do teachers find their work rewarding and satisfying : Do teachers find their work rewarding and satisfying? An article reports the results of a survey of 398 elementary school teachers and 262 high school teachers
Compare legislative branch to powers of executive branch : Compare the powers of the legislative branch to the powers of the executive branch. Which has more power today and why? Provide a fully developed essay of at least 500 words, and cite sources used.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Explain about cnss model

The CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.

  Potential logical threats that require attention

Information Systems Security, Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. Determine the impact of at least five (5) potential logical threats that require attention

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

  To ensure the security of the files used by the new web site

To ensure the security of the files used by the new Web site, files need to access controls that limit which users can view and execute them. To further your understanding of file permissions, describe in detail these 5 file listings, explain a..

  What is the plaintext for the ciphertext 10000001

What is the ciphertext (in binary form) generated by the encryption of the character T (Please show your work.)

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Analyze personal privacy issues

Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios. Competencies: Critical thinking, communication skills

  How is your firewall implementation

Imagine you have installed and configured firewalls in all of the right places within your organization's network. Like any other organization, you try to stay current by deploying the latest and greatest in firewall technology.

  Discuss the difference between hmac and mac

The Message Authentication Code (MAC) is a widely used technique for performing message authentication, and one MAC algorithm has emerged as the Internet standard for a wide variety of applications: Hash-Based Message Authentication Code (HMAC)

  Instructions of research paper

The instructions of research paper is to write about steganography techniques and applications - types and techninques of steganography and then discuss in-depth how is is used, which technique is popular, include Figures of how the technique is us..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd