Explain the various aspects of cp

Assignment Help Management Information Sys
Reference no: EM131306722

Q1) You are a security manager at a medium size company. Your company currently does not have a CP Process in place. Your CIO has just asked you to brief the overall concept of CP and how we could implament it within the company. Create a presentation that would explain the various aspects of CP, and how it could be implamented within the company. Talk about time line needed for execution, budgeting, training, resources, capabilities needed, and senior level support. The presentation should be at least 25 minutes but less than 35 minutes describing your strategy. At least 15 slides is required.
Also write a reflection paper (4-7 pages) on the case study

Q 2) You are now in the phase of developing a business continuity plan (BCP) for an organization. Describe the basic activities that must be managed by the BCP. Develop plans for alternate site relocation, and develop an estimated monthly budget for the alternate site operations. Detail out the Site Resumption Strategy and the time needed to become fully operational. Provide summary level budget information for the site resumption strategies you did not choose and defend your recommendation.

Q 3) Conduct research on the World Wide Web and describe the top, 3 major threats and drivers effecting the C.I.A. triangle. What are the top 3 Security Controls & Methodologies used today in industry and how would you incorporate it into your Response Strategies as a Security Manager.(C.I.A. triangle The three most critical characteristics of information used within information systems: confidentiality, integrity, and availability.)

Reference no: EM131306722

Questions Cloud

How do economists derive estimates of marginal damages : How do economists derive estimates of marginal damages from estimates of total damages? Why is a discount factor used in these calculations? What results do they find?
Determine the dressed size area moment of inertia : Determine the dressed size, area, moment of inertia, and section modulus for the following members. Give values for both axes. Tables may be used (cite reference).
What does mbsa do to check for weak local account : What does MBSA do to check for weak local account passwords and why is it important to have a strong password on local user accounts especially in a corporate environment?
How effective is the process to administer physical security : Who is in charge of physical security? Why? Is this person also in charge of logical security? Why or why not?What types of physical security measures are in place? Why?What specific tools or hardware are used for physical security? Why?How effective..
Explain the various aspects of cp : You are now in the phase of developing a business continuity plan (BCP) for an organization. Describe the basic activities that must be managed by the BCP. Develop plans for alternate site relocation, and develop an estimated monthly budget for th..
Advise jack and jill of their income tax consequences : Advise Jack and Jill of their income tax consequences arising out of the above information under both the diminishing value method and the prime cost method (if relevant) for the year ended 30 June 2015. Assume that the business does not qualify as a..
List the sku which was purchased the most : List the SKU which was purchased the most. List the two SKUs that were purchased most frequently together. List the three SKUs that were purchased most frequently together.
Investigate the application of the chunking process : The purpose of the study was to investigate the application of the chunking process to the design and delivery of workforce training. Students in a 1-hour course (N = 110) were measured on learner reaction, learning score achievement
Analyze what is the marginal rate of transformation impact : What is the labor-intensive good? What is the Marginal Rate of Transformation impact? What is the labor-abundant country? What is the capital-abundant country?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Powerpoint presentation of technologyin this assignment

powerpoint presentation of technologyin this assignment take a few minutes to contemplate the world of business as you

  Explain access control methods and attacks

Examine whether your risk assessment methodology is quantitative, qualitative, or a combination of these, and discuss the main reasons why you believe that the methodology that you utilized was the most appropriate.

  What are good practices when deploying directory services

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable not to integrate a DNS zone into AD.

  What is the mindset required to properly protect

what is the mindset required to properly protect information? what role does reasoned paranoia play in the minded and

  What are you thoughts on this presentation

What are you thoughts about companies collecting data about you? Do you feel this type of data collection is a beneficial or detrimental? Why? Do you feel you have a right to know what data companies are collecting about you? Does this concern you..

  Define each component of an information system

Define each component of an information system. Define how you can use the five-component model to guide your learning and thinking about information systems.

  Why is the organization inventory policy important

What is the difference between the probability of a stock-out and the magnitude of a stock-out? Give example to support your response.2. Why is the organization's Inventory policy important?

  Hyper-social organization and erp systemsi need help in

hyper-social organization and erp systemsi need help in answering these questions about hyper-social organization and

  Challenges he will face in managing the merger with nokia

Do some reading about Nadella and the challenges he will face in managing the merger with Nokia. Also, review the background materials on organizational change and pay close attention to models such as the Lewin three-step model, Kotter's eight s..

  Data warehouse and database design

Data Warehouses - Project Plan and Requirements for the Data Warehouse and Database Design

  Who are some targets or victims of hate crimes

Who are some targets or victims of hate crimes? What are some of the causes and effects of these crimes? What actions can be taken to minimize the occurrence of hate crimes?

  What processes are indispensable to be performed

Compare and contrast the features/ functionalities of two accounting software packages offered by accounting software package vendors (e.g. SAP, MYOB, Xero etc.) within your selected category in question 4. (600 words)c) Which one would be the mos..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd