Order for this Paper or Similar Assignment Writing Help

Click to fill the order details form in a few minute.

Posted: October 15th, 2022

Risk Management

Computer Sciences and Information Technology
Risk Management
Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http://www.computerworld.com/s/article/9219867/9_11_Top_lessons_learned_for_disaster_recovery , and consider the effects the attacks of September 11, 2001, have had on technology recovery efforts.
Write a two to four (2-4) page paper in which you:
Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations.
Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain risk management in the context of information security.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and business continuity.
Explain and develop a business continuity plan to address unforeseen incidents.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Risk Management
This involves identifying the risks and using resources available to minimize, monitor and control the possibility or outcome of unfortunate events. The September 11 attack also known as the 9/11 attack included a series of four organized attacks by terrorists. The attack leads to the death of 2,996 people, over 25000 people injured and destruction of property and infrastructure of at least $10 billion. The main aim of risk management is to ensure safety more so of the employees. As the towers collapsed more lives and properties were damaged, according to research the buildings were constructed to overcome impacts but not plan for the fuel load of the plane. Thus businesses took the initiative for the construction of standardized building’s code to deal with new threats, and also create better exit means and entrance for police and firefighters. Due to the sudden attack, most businesses had to close for a great period.
Due to this unforeseen threat businesses that had their chains concentrated in a single place suffered a great loss. Hence the initiative of relocating the branches to different geographical locations is being implemented to ensure productivity. Despite being a great attack most insurance companies did not suffer since they don’t have a terror insurance policy. This led to closure of businesses due to damage incurred thus the government introduced the terror risk insurance Act that share loss between the government and insurance companies. Social media can be used as an emergency management tool. It helps send disaster warnings, receive victim requests, monitor activities that may create suspicion and also use the pictures to estimate incurred damages. It also helps to prevent the breakdown of communication that may arise due to reliance on a single communication tool. It can also be used to send information and receive feedback by wall posts or messages (Burger, 2014).
Companies need to consider the geographic location because in the case of a disaster this will prevent the destruction and damage that may be caused to both the main site and the backup center. The recovery point objective entails the amount of data that can be lost before significant damage is an experience by the business. The recovery time objective involves the time applications can be down before causing major problems. This affects the geographical location decision since if the data center is too far the data may not be mirrored in real-time. Hence this disaster could cause data loss. The amount of time one has to wait before data recovery will also affect whether to store data on premise or cloud. A cloud-based recovery system enables the back-up and recovery of data on a cloud-based platform. It provides both the recovery point objective and recovery time objective.
It provides storage space and continuously updates the designated systems with the installed software. It also allows the users to add, edit, and delete systems without having to worry about it being backed-up. It’s effective for recovery since the process is faster. One can use the automated tools to automate the in-build cloud recovery process thus the cost, price and time will less compared to other recovery processes. It’s more flexible since this recovery facilities can be easily moved to other locations. It could also decrease recovery effectiveness since it’s not easy to recover a large amount of data, this takes time and may also have impacts on the local systems. Cloud recovery is ideal for all businesses since small businesses can use public cloud in storing the data. For large companies with big data and sensitive information that may have greater leakage risk can use the private or hybrid cloud in storing data. The data is also accessible from anywhere with the internet (Chan, 2019).

Reference
Burger, K. (2014, September 11). What Have We Learned About Risk Management Since 9/11? Retrieved from https://www.insurancetech.com/security/what-have-we-learned-about-risk-management-since-9-11/a/d-id/1315630d41d.html?
Chan, M. (2019, June 17). How to improve your disaster recovery plan with the cloud. Retrieved from https://www.thorntech.com/2017/05/cloud-disaster-recovery/

Check Price Discount

Study Notes & Homework Samples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by students.

Top Tutors

The team is composed solely of exceptionally skilled graduate writers, each possessing specialized knowledge in specific subject areas and extensive expertise in academic writing.

Discounted Pricing

Our writing services uphold the utmost quality standards while remaining budget-friendly for students. Our pricing is not only equitable but also competitive in comparison to other writing services available.

0% similarity Index

Guaranteed Plagiarism-Free Content: We assure you that every product you receive is entirely free from plagiarism. Prior to delivery, we meticulously scan each final draft to ensure its originality and authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00