Reduce the potential for economic damage

Assignment Help Basic Computer Science
Reference no: EM131040575

Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.

Imagine you have been hired as a disaster recovery trainer. Your job is to respond to a scenario that requires individuals being trained to evaluate a simulated disaster response. The simulated organization and disaster are outlined in the attached "LPHG Disaster Recovery Scenario." The organization's plan's, policies and impact analysis are attached as well ("LPHG Backup and Recovery Policy," "LPHG Business Impact Analysis," "LPHG Disaster Recovery Plan")

Task:

A. Using the attached "After Action Report Survey Template," create an after action report (AAR) by doing the following:

1. Discuss the plans, procedures, or other documents that were in place before the disaster in the General Information section of the template.

2. Summarize what occurred during the response in the scenario in the General Information section of the template.

3. Identify three strengths.

4. Analyze the strengths of the disaster response in the scenario by doing the following:

a. Discuss the contributing factors of each of the three strengths.

i. Discuss how the organization's plans, policies, and impact analysis contributed to each strength.

b. Discuss positive consequences of each of the three strengths.

c. Recommend ways to improve on each of the three strengths.

5. Identify three areas of improvement.

6. Analyze the areas for improvement of the disaster response in the scenario by doing the following:

a. Discuss the contributing factors of each of the three areas for improvement.

i. Discuss how the organization's plans, policies, and documents contributed to each of the three areas for improvement.

b. Discuss consequences of each of the three areas for improvement.

c. Recommend changes to the response plan (e.g., plans, procedures, equipment, training, mutual aid support, management, and leadership support) that could resolve the causes of each of the three areas for improvement.

B. When you use sources, include all in-text citations and references in APA format.

Note: Provided documents do not require citation.

Reference no: EM131040575

Questions Cloud

Difference between call by reference-call by value method : What is the difference between call by reference & call by value method in a user defined function in C++? Explain it with suitable example.
Windows network services proposal : Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..
What are the differences between power and leadership : What types of power tactics have you used in your own interactions with bosses, co-workers, or employees? Which do you find most effective? Why?
Growth in telecommuting and other mobile work arrangements : Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist by 2020? Why or why not?
Reduce the potential for economic damage : Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.
Bring your own device can cause problems : Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent a..
Identify the specific components of an an institution : Identify the specific components of an an institution. Next use two (2) examples of institutions - such as a financial system, a judical system, or the armed forces - to illustrate what developing countries overall have done to weaken or strength..
Activities of the employee benefit system : Alice has a high regard for privacy and wants the system to have employeesregister and give permission to obtain financial amounts from the dental insurance and retirementcompanies. Draw a use case diagram, context-level data flow diagram represen..
Examine the various tools and techniques for analyzing : Examine the various tools and techniques for analyzing and monitoring the organization's environment. In your response, focus on two of the examples included in the text. First define the tool or technique; then, provide a scenario in which this t..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The design process ensure a good design

The design process ensure a good design.

  Penetration testing & vulnerability assessments

Penetration Testing & Vulnerability Assessments

  Open a new database in microsoft access

Open a new database in Microsoft Access

  How many instructions does the machine execute

Suppose a person is typing forty words per minute at a keyboard. (A word is considered to be five characters.) If a machine executes 500 instructions every microsecond (millionth of a second), how many instructions does the machine execute during the..

  Latest threats and security issues

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk t..

  Why should the company consider these best practices

Operational Factors: If the company adapts its website for international visitors, what operational factors will the company need to consider? For example, would the company's payment process need to change for international visitors? Provide a de..

  Explores the performance consequences

This problem explores the performance consequences of having only a single level of cache in a modern processor with 40 ns DRAM column access time and a clock period of 400 ps (clock frequency 2.5 GHz). You are given the following data: A particul..

  What role do users have in the development phase

What advantages does commercial off-the-shelf software provide over custom software? What role do users have in the development phase and integration phase for information systems

  The success of 24-bit digital audio technologies

3. A company noting the success of 24-bit digital audio technologies compared to earlier 16-bit digital audio technologies has decided to work on developing a 28-bit digital audio technology. a. Describe the type of signal conversion being utilized a..

  What is an evil twin access point and a rogue twin access

What is an evil twin access point and a rogue twin access point?

  What other measures do you feel should be taken

How effective do you feel these and other measures are in protecting children from sexual predators online? What other measures do you feel should be taken? Are current laws sufficient for protecting children, or are additional laws needed?

  What are some business uses for inserting a canvas

Write a response that answers the following: What are some business uses for inserting a canvas in a Microsoft® Word document. From these uses, propose a strategy that may help users overcome formatting issues.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd