What feasible solution could be proposed to restore

Assignment Help Management Information Sys
Reference no: EM132284820

The crucial starting point to developing an effective disaster recovery plan is by cultivating an efficient Business Impact Analysis (BIA). A BIA evaluates and identifies vulnerabilities and conveys how these known and unknown risks will impact the organization's core business processes and functions.

More importantly, it enables an organization to strategically plan alternative practices and procedures to minimize the impact of the disruption on systems, functions, and services. This week you will conduct a BIA for a real organization. The purpose of this assignment is to enable you to engage and actively think through some of the components required to develop a BIA, which guides an organization's disaster planning efforts.

Assignment:

Very briefly, identify and provide some background on your selected company, services it offers, and key stakeholders. The company must be real and you should include in your introduction the link to its website. Identify one critical business operation, process, or function (note: this is something that the organization does).

What technology, personnel, and/or other resources are required to support this identified operation, process, or function? What is the maximum allowable outage time for the operation, process, or function? Identify two inputs and outputs for the selected operation, process, or function

(note: inputs are what are put into the process, operation, or function; outputs are what the process, operation, or function produces).

Elaborate on each of the inputs and output and any other dependencies. Are there any Federal, state, or regulatory laws that may be violated if the operation, process, or function were inoperable? If so, what are they and briefly explain what each of the identified laws means. If not, explain why.

While the identified primary operation, process, or function is inoperable, what feasible solution could be proposed to restore its functionality temporarily? What benefit(s) would these alternative solutions have for the business? What disadvantages would these alternative solutions have on the business?

Instructions:

After reading the grading rubrics, your scenario papers must:

Adhere to all assignment requirements outlined in the course syllabus;

Address the questions in the order presented;

Questions are prepared to help guide critical thinking through the scenario's problem and to build a case to propose viable recommendations for a solution.

Not include the questions in the submission;

Not contain contractual phrases, as an example "shouldn't" "couldn't" or "didn't," or similar

Not contain vague words such as "proper," "appropriate," "adequate," or similar to describe a process, function, or a procedure.

As an example, "proper incident response plan," "appropriate IT professional," "adequate security," or similar. These words are subjective because they have a different meaning to different individuals.

Reference no: EM132284820

Questions Cloud

What is the npv of the expansion : What is the NPV of the expansion? (answer in terms of millions, so 1,000,000 would be 1.0000)
Does home delivery reduce any costs : What are the characteristics of businesses that can succeed with same-day delivery? Does home delivery reduce any costs?
How the dubai metro station has minimal history : Write about the Milan metro station (history, the design, interior, exterior, symbolism, deep analysis, describe how the city is always moving in relation.
Calculating project cash flows and? npv : The Guo Chemical Corporation is considering the purchase of a chemical analysis machine.
What feasible solution could be proposed to restore : Identify and provide some background on your selected company, services it offers, and key stakeholders.
What is the current share price : If the required return is 12 percent and the company just paid a $3.80 dividend. What is the current share price?
The importance of businesses monitoring social media : The importance of businesses monitoring social media within the workplace when utilizing employer-provided computers, cell phones, tablets, etc.,
Discuss the dance mask in detail : Choose three of the following questions and write a 150-350 word response to each question (points deducted for not meeting word count requirements).
Policy related to the prevention of sexual harassment : A policy related to the prevention of sexual harassment and discrimination including specific action items that will be required of employees and management.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What role does information technology play in the businesses

What role does information technology play in businesses? How is it helping them refine their business strategy? Will Walmart be successful against Amazon.com?

  Which of the following are penetration testing methodology

Which of the following are Penetration testing methodology? Which of the following skills are needed to be a security tester?

  Describe elements of an information security plan

The paper must follow the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing).

  Utilize workflow database technology

Important information about workflow database technology - healthcare radiology organization utilize workflow database technology?

  As the companys product manager your boss the marketing

as the companys product manager your boss the marketing manager is concerned about the future success or viability of

  Identify steps that hackers take to find flaws in the system

Identify the steps that hackers take to find flaws in the system. Identify potential security measures to stop forced browsing

  What three types of it resources need to be managed well

What three types of IT resources need to be managed well? What kinds of portable IT help employees work more efficiently and effectively? What may interfere with productivity?

  Discuss the different components of an information system

Define how you can use the five-component model to guide your learning and thinking about information systems.

  What consequences did the offender sustain-prison time

Compare white collar crime in the United States to white collar crime in India: what are the characteristics of people in India who commit white collar crime (e.g: age, occupation or profession, lifestyle). Find a case of white collar crime that ..

  What roles did the end users and information systems play

Question: What roles did the end users and information systems specialists play in the systems transformation project?

  Discuss the social media interaction and safety reporting

Safety reporting for Civilian (such as personal identification), Federal, State, Local Law Enforcement, Local Medical Emergency Responders.

  Technology impact and added valuebased on assigned readings

technology impact and added valuebased on assigned readings other readings or personal experience discuss the impact of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd