Detail the dr team roles responsibilities and sub teams

Assignment Help Basic Computer Science
Reference no: EM13463036

Consider a scenario where the contingency planning management team (CPMT) of your organization has designated you as the disaster recovery team leader, and the preparation and planning of this component of the security program is now under your purview with a team of 11 employees including yourself.

Write a two to three (2-3) page paper in which you:

Q1. Detail the DR team roles, responsibilities, and sub teams that would be implemented, and construct an organizational chart for the team through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

Q2. Describe the proper procedures and policies that would be implemented specific to the DR team personnel as well as special equipment that would be required.

Q3. Draft an executive summary to the DR plan and explain the purpose of the plan and high-level specifics for upper management.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.

Reference no: EM13463036

Questions Cloud

Conversely determine the effect of information technology : q1. evaluate and discuss the human resource security privacy and stability issues affected by information technology.
Describe what technologies you believe provide the biggest : assess the challenges e-business and e-commerce technologies present to the field of information technology. describe
Wite essay on different neurological disorders which can : write 500 word essay on 2 different neurological disorders that can occur in development and how it affects
Seculate the foreseen challenges when the organization : imagine you are an information systems security officer for a large federal government contractor. the cio has recently
Detail the dr team roles responsibilities and sub teams : consider a scenario where the contingency planning management team cpmt of your organization has designated you as the
Explain the difference between project-based and : prepare a list of it project-based tasks in an organization where you have worked. if you have not worked in any
Explain some of the most effective ways for companies to : what are some of the most effective ways for companies to monitor employee motivation satisfaction and performance?
Determine the security risks with respect to phishing : mobile banking features have added several advantages for customers however there are security risks that come with
How important is the fdca project for the us census bureau : how important is the fdca project for the u.s census bureau? how does it impact decision making and operational

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the practical benefits

What are the practical benefits, if any, of importing a specific class rather than an entire package (e.g. import java.net.* versus import java.net.Socket)?

  What needs to be done to avoid such problem

Based on our class discussion regarding E-R Diagrams, if an attribute is appearing in a number of entity sets does this situation lead to the issue of data redundancy? If yes, what needs to be done to avoid such problem?

  How many members of the group like all parties

while two dislike the Liberals, NDP, and Green Party; three dislike the Conservatives, New Democrats, and Greens; and four dislike the Conservatives, Liberals, and Greens. Two people dislike all four parties. How many members of the group like all..

  Who are learning software programming

Discuss when scripting should be taught to individuals

  Provide injective function from to and explain why injective

Provide an injective function from ? to ? and explain why it's injective

  Receive the measurement for the diam-eter of a circle

Design an algorithm that will prompt for and receive the measurement for the diam-eter of a circle, and calculate and display the area and circumference of that circle. Your program is to continue processing until a sentinel of 999 is entered.

  What are local and global variables

What are local and Global variables? And how many input variables can a MATLAB function have ?

  The built in python string functions

letterCount(letter, myString) This function should take a single letter, and then a string. It should return the number of times letter occurs in myString. So the call letterCount('h', 'hello') should return 1, and the call letterCount('a', 'aa..

  Investigate and compare winpcap

Investigate and compare WinPcap and two other network packets capture software Products.

  Write assembly language program that prints your first name

Write an assembly language program that prints your first name on the screen. Use the .ASCII pseudo-op to store characters at the bottom of your program. Use the CHARO instruction to output characters.

  Innovation to optimize system power cost

Would you adopt this innovation if metric you were attempting to optimize was system power x cost? Suppose a defect density of 0.4/cm2, an alpha of 4, and a wafer of diameter 30cm.

  Find the sum of the squares of the integers

Find the sum of the squares of the integers from 1 to My Square, where My Square is input by the user.be sure to check that the user enters a positive integer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd