Describe your approach to handling an organization

Assignment Help Computer Engineering
Reference no: EM133520987

Case Study: A vital role for all managers is planning. Managers in IT in general and information security usually provide strategic planning for an organization to ensure the continuous availability of information systems. Unfortunately for managers, the probability that some form of the damaging event will occur, whether it be from inside or outside, intentional or accidental, human or nonhuman, annoying or catastrophic, is very high. Thus, managers from each community of interest must be ready to act when a successful attack occurs. There are various types of plans for events of this type, and they all fall under the general definition of contingency planning. A contingency plan is used to anticipate, react to, and recover from events that threaten the security of information and information assets in the organization; it is also used to restore the organization to normal business operations. Contingency planning (CP) typically involves four subordinate functions: 1 Business impact analysis (BIA), Incident response planning (IRP), Disaster recovery planning (DRP), Business continuity planning (BCP).

Question: Describe your approach to handling an organization's incident contingency plan.

Budgeting for Contingency Operations As a final component to the initial planning process, the CPMT must prepare to deal with contingency operations' inevitable expenses. Although some areas (such as incident response) may not require dedicated budgeting, other locations (such as disaster recovery and business continuity) require ongoing expenditures, investment, and service contracts to support their implementation. The ugly reality is that many organizations are "self-insured" against some types of losses, such as theft of technology, equipment, or other resources. Ideally, this means that instead of payments to an outside insurance organization, the organization puts a set amount each fiscal cycle into an account it can then draw upon should replacements be required. However, with tight budgets and drops in revenues, some organizations forego these investments instead of betting on the probability that such losses, if they occur, will be minimal and can be funded out of regular budgets. Should a disastrous expense occur, however, the organization is at risk of complete failure and possible closure. Some of the budgeting requirements of the individual components of CP planning are presented in the following sections. Incident Response Budgeting to no small extent, IR capabilities are part of a typical IT budget. It is customary for the CIO to have their managers ensure that data protection and response and backup and recovery methods (described later) are part of normal operations.

Question: How would you present a financial report for the next year to your supervisor or CEO? What analytics would you offer to support your upcoming budget?

 

Reference no: EM133520987

Questions Cloud

What is the strength of each brand : What is the strength of each brand. Which did the article recommend. Which would you purchase based on how you use your computer?
How would you describe one of the cognitive biases : How would you describe one of the cognitive biases discussed in the video or in your assigned reading - How can biases cause people to make inaccurate decisions
Identify and define all hardware and software devices : Identify and define all hardware and software devices, and the different types of sensitive data the organization will store. Explain the organization
How would you countercondition your given cr : How would you countercondition your given CR? (Make sure to use clearly label each component of the counterconditioning template)
Describe your approach to handling an organization : Describe your approach to handling an organization's incident contingency plan. How would you present a financial report for the next year to your supervisor
What are issues associated with developing those plans : What are standardized crisis plans and what are issues associated with developing those plans? Do standardized crisis plans benefit some populations/communities
Disadvantages of direct assessments in aba : Discuss the advantages and disadvantages of direct assessments in ABA?
Discuss the internal and external factors needed to perform : discuss the internal and external factors needed to perform a thorough SWOT analysis for BCC. identify strengths and weaknesses, while external factors are
Discuss challenges to creating performance : Discuss challenges to creating performance indicators and collecting data that shows actual performance.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd