CIS359 Strayer 9/11 Top Lessons Learned for Disaster Recovery Article Paper

User Generated

QVNZBAQPW

Computer Science

CIS359

Strayer University

Description

Case Study 2: Disaster Recovery (DR) Lessons Learned: September 11th

Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http://www.computerworld.com/s/article/9219867/9_11_Top_lessons_learned_for_disaster_recovery , and consider the effects the attacks of September 11, 2001, have had on technology recovery efforts.

Write a two to four (2-4) page paper in which you:

  1. Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
  2. Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
  3. Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
  4. Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations.
  5. Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
  6. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain risk management in the context of information security.
  • Summarize the various types of disasters, response and recovery methods.
  • Compare and contrast the methods of disaster recovery and business continuity.
  • Explain and develop a business continuity plan to address unforeseen incidents.
  • Develop techniques for different disaster scenarios.
  • Use technology and information resources to research issues in disaster recovery.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
  • Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: DISASTER RECOVERY

1

DISASTER RECOVERY
Name:
Institutional affiliation:
Date:

DISASTER RECOVERY

2
DISASTER RECOVERY

Introduction
With the advanced and competitive environment, businesses need to adopt risk
management and recovery strategies that are of importance during disasters. Risk management
and recovery plans are essential since they ensure no breakdown in the daily operation of their
activities. Enterprises can use cloud services that are essential in storing data. Also, other backup
devices can be installed in various departments to ensure data is restored after disasters.
How the attacks affected risk management in organizations
After the initiatives on 9/11, the Information Technology managers had to come up with
ways that would finance the plans on disaster recovery plans and technology. The idea of risk
management was to be a part of the calamity recuperation choices. However, this prompted
numerous instances of extortion and rebel exchanging. The US utilized several million dollars in
upgrading the internal frameworks. They also needed financial services to flag suspicious
transactions and customers. In the 9/11, 39% went on improving the back end systems, 34% was
spent on the new software, and 24% was used to enhance the IT infrastructures ((Ryu et al.,
2013). There was also 2%, which was spending on outsourcing serv...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags