Friday, June 21, 2019
The issues, procedures, and techniques involved in IT resource Research Paper
The issues, procedures, and techniques involved in IT resource contingency planning - Research Paper ExampleIn this regard, a study of a sampled composition which has implemented a range of technologies is to be accomplished. The primary goal of the investigation is to evaluate the policies, approaches, procedures, and teams which are associated to incident reception and recovery. A secondary purpose of the investigation is to develop a set of the effective measures to ensure that the organization achieves business tenaciousness after incidences with minimum incurrence of costs. As per the hypothetical case study, shortly there is no business continuity, disaster recovery and incident response plans. In order to do so, there are many factors that can be taken into consideration. The first objective is to establish a risk management framework. The risk assessment framework will incorporate addition identification and classification. plus identification can also be called as asset inventory. Asset inventory comprises of all assets that are deemed critical, important or general. After establishing asset inventory, asset classification is carried out. Likewise, the classification scheme will be drawn, as defined by the data, system or application owners, as they are the relevant spate to determine the levels for each asset. After defining the asset inventory and asset classification, our next objective is to carry out risk management. Likewise, risk management comprises of dickens components i.e. Risk assessment and Risk management. Risk assessment incorporates cost benefit analysis that justifies the total cost of the asset and the total cost unavoidable to encourage and ensure redundancy. However, it is essential to make a balance or the total cost of an asset may not exceed the total cost required for securing it or providing redundancy. Critical questions that need to be answered for conducting a successful risk management are Which information asset i s the some critical to the success of the organization? Which information asset generates the most revenue? Which information asset generates the highest profitability? Which information asset is the most expensive to replace? Which information asset is the most expensive to protect? Which information assets loss or compromise would be the most embarrassing or cause the greatest indebtedness? After the completion of risk assessment, risks can be prioritized and can be managed with associated or allocated cost and their impact levels on the business. Moreover, for establishing a comprehensive business continuity plan, following factors are mandatory Business Continuity Planning Governance Business Impact Analysis (BIA) Procedures and activities for business continuity Instant procedures Quality effrontery The disaster recovery sites must ensure to meet the Recovery Time Objectives, Recovery Point Objectives Service Delivery Objectives, Crisis Opening (Disaster Declaration) and Cris is end. Figure 3 illustrates the preparation of designing and validating a BCP plan based on these parameters. Figure 3 Image Retrieved from (Sheth, McHugh, & Jones, 2008) Furthermore, for establishing incident response functions, Computer security incident response teams are required with trained staff. Through a sampling methodology, a convenient sample will be attained from organizations which have heavily active technology in their operations and have been affected by security incidences and breaches. Therefore a primary research methodology will be conducted to get ahead data and information on the approaches which the organizations selected in the sample employ in the achievement of effective response and recovery
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.