Week 4 Lab: Assessment Worksheet Performing a Business Impact Analysis for an IT Infrastructure Overview Answer the following questions‚ specific to the creation and focus of Business Impact Analysis as well as BCP documentation. Lab Assessment Questions & Answers 1 What is the goal and purpose of a BIA? To identify which business units‚ operations‚ and processes are crucial to the survival of the business. 2 Why is a business impact analysis (BIA) an important first step in defining a business
Premium Business continuity planning Management Risk management
Access 2010: Chapter 1 – Short Answer Instructions: Fill in the best answer. 1. A data management system‚ such as Access‚ is software that allows you to use a computer to create a database. 2. The rows in the tables are called records. 3. The Long Integer field size is for values in the range of –2‚147‚483‚648 to 2‚147‚483‚647. 4. In Access‚ all the tables‚ reports‚ forms‚ and queries that you create are stored in a single file called a(n) Access database. 5. Design view
Premium Database Database management system SQL
RISK-THREAT-VULNERABILITY PRIMARY DOMAIN IMPACTED Unauthorized access from public Internet User destroys data in application and deletes all files Hacker penetrates your IT infrastructure and gains access to your internal network Intra-office employee romance gone bad Fire destroys primary data center Communication circuit outages Workstation OS has a known software vulnerability Unauthorized access to organization owned Workstations Loss of product data Denial of service attack
Premium Computer security Risk Security
Chapter 1 1. Briefly describe how outsourcing and strategic alliances have impacted IS organizations. Page Ref: 9 2. Describe the key differences between procedure-based information work and knowledge-based information work. Page Ref: 18 3. Why is it important for the IS organization to recognize the distinction between procedure-based activities and knowledge-based types of information work? Page Ref: 19 4. Briefly describe how the Web has changed the term data. Page Ref:
Premium Management Strategic management Information
Quantitative SCOPE: network architecture Network monitoring and maintenance Additional system administrator Risk of non compliance Critical areas ● Cost of missing deadline The deadline is in 9 months after that every additional month over deadline is 100‚000 dollar fine‚ however the contract will end if it goes over 3 months pass the deadline ARO = 3 MONTHS SLE = 100‚000 ALE = 300‚000 OR ARO X SLE ● Storage space 3 new wiring closets will be needed if we build a 10
Premium Management Risk Building
Lab #8: Assignment Worksheet Develop an Outline for a Business Continuity Plan for an IT Infrastructure 1. How does a BCP help mitigate risk? BCPs help mitigate an organization’s risks by ensuring that the organization is better prepared for disaster. 2. What kind of risk does a BCP help mitigate? Organizational risk 3. If you have business liability insurance‚ asset replacement insurance‚ and natural disaster insurance‚ do you still need a BCP or DRP? Why or why not? Yes you still need BCP AND
Premium Business continuity planning
Disaster Recovery Plan 1. Scope of Work and Contact Information This plan is designed to ensure the continuity of the business in the event of a natural and/or catastrophic event at any location Contact Information: 1. Chief Executive Officer 2. Chief Financial Officer 3. Chief Information/Technology Officer 4. Vice Presidents 5. Department Heads 6. IT Teams 7. Emergency Response Teams 8. All employees of affected area 2. Notification/Activation Phase Notification will be given to
Premium Management occupations Executive officer Corporate governance
Assesment Lab #3: Assessment Worksheet Lab 3 1. What is the goal or objective of an IT risk management plan? - The purpose of the Risk Management Plan is to define how risks will be managed‚ monitored and controlled throughout the project. 2. What are the five fundamental components of an IT risk management plan? -The components of a Risk Management Plan are: Risk Identification‚ Risk Analysis‚ Risk Evaluation‚ Risk Monitoring and Review. 3. Define what risk planning is. - Risk planning
Premium Risk management Risk
1. Define an SLA and state why it is required in a risk adverse organization Is a document that identifies an expected level of performance. It identifies the minimum uptime or the maximum downtime. Organizations use SLAs as contracts between a service provider and a customer. An SLA can identify monetary penalties if the terms are not met. Also at the bare minimum is should be the organizational Mission. If your organization has SLAs with other organizations‚ these should be included in the risk
Free Risk
Application of Risk Management Techniques Treats that this company is vulnerable to are but not limited to tornado‚ malware‚ equipment failure‚ stolen data‚ DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves‚ a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all
Premium Windows Vista Security Backup