Explain the basic primary tasksand major policy

Assignment Help Computer Engineering
Reference no: EM132210033

Assignment 1: Continuity Planning Overview

Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members.

Write a three to four (3-4) page paper in which you:

1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager.

2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical.

3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each.

4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s).

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Compare and contrast the methods of disaster recovery and business continuity.

• Explain risk management in the context of information security.

• Use technology and information resources to research issues in disaster recovery.

• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Reference no: EM132210033

Questions Cloud

Explain how the attacks affected risk management : Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives.
Construct a process-flow diagram using given information : Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario.
Discuss in detail the role that an ids-ips would play : Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification, determination.
Summarize various types of disasters and recovery methods : Read the article titled "When Stuxnet Hit the Homeland: Government Response to the Rescue," from ABC News and consider this threat in terms of incident response
Explain the basic primary tasksand major policy : Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager.
Guess an integer that the user has picked : Write a program that will guess an integer that the user has picked. Imagine that the user will write down a positive integer x on a piece of paper.
Write a program to find the area of a triangle : Build a function to accept the sides of the triangle (check if the sides form a triangle if yes returns the area otherwise returns zero.
Individual incentive plans are less preferable : "Individual incentive plans are less preferable than group incentives and company wide incentives.
A program to help an analyst decrypt a simple substitution : Write a program to help an analyst decrypt a simple substitution cipher. Your program should take the cipher text as input.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Compare the positive and negative aspects of dac and rbac

Compare the positive and negative aspects of employing a MAC, DAC, and RBAC. Suggest methods to mitigate the negative aspects for MAC, DAC, and RBAC.

  Give a short overview of any five programs

Visit Web sites for companies that sell computer peripherals. Compile a list that contains as many types of input and output devices as you can locate on these Web sites. After compiling this list, be sure to document the Web sites you viewed to d..

  Communication issues in social media

Communication issues in Social Media. Most will recognize the good and the bad consequences of participation in Social Media.

  Discuss regulatory issues surrounding the area

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference

  Which sentence would work better as a thesis statement

Which sentence would work better as a thesis statement for a three-to-five-page college paper?

  Proposing the reasonable values

Propose the reasonable values for items in risk register for this asset and threat, and give the justifications for your choices.

  Write code in java language and show all lines of code

Use a for loop to sum a series of integers. It must sum every fourth integer from 3 to 23. Please show all lines of code. Write code in Java language.

  What is the effect of the given statement

What is the effect of the statement m[1234] = "Jane Smith";? What is returned by m[1234]? What is returned by m[1500]?

  Describe cybersecurity roles and responsibilities

Describe cybersecurity roles and responsibilities to protect security for the corporate business mission (for example, the Insider threat, Access Controls).

  Why does asymmetric cryptography work best for applications

Why does asymmetric cryptography work best for these applications? Description of algorithms that implement Asymmetric cryptography and strengths of algorithm.

  Add the users tbanks and jdoe to the group acctg

Change the properties of the existing user tbanks such that the user is a member of the managers group and has a login name of artbanks.

  What are the steps you have taken to maintain and redesign

what are the steps you have taken to maintain and redesign your site over the past several weeks? how is the process

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd