Academic Writing Experts For Your Research Projects

Order custom papers, masters thesis and dissertation in 3 guided steps; human written!

Posted: October 15th, 2022

Risk Management

Computer Sciences and Information Technology
Risk Management
Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http://www.computerworld.com/s/article/9219867/9_11_Top_lessons_learned_for_disaster_recovery , and consider the effects the attacks of September 11, 2001, have had on technology recovery efforts.
Write a two to four (2-4) page paper in which you:
Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations.
Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain risk management in the context of information security.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and business continuity.
Explain and develop a business continuity plan to address unforeseen incidents.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Risk Management
This involves identifying the risks and using resources available to minimize, monitor and control the possibility or outcome of unfortunate events. The September 11 attack also known as the 9/11 attack included a series of four organized attacks by terrorists. The attack leads to the death of 2,996 people, over 25000 people injured and destruction of property and infrastructure of at least $10 billion. The main aim of risk management is to ensure safety more so of the employees. As the towers collapsed more lives and properties were damaged, according to research the buildings were constructed to overcome impacts but not plan for the fuel load of the plane. Thus businesses took the initiative for the construction of standardized building’s code to deal with new threats, and also create better exit means and entrance for police and firefighters. Due to the sudden attack, most businesses had to close for a great period.
Due to this unforeseen threat businesses that had their chains concentrated in a single place suffered a great loss. Hence the initiative of relocating the branches to different geographical locations is being implemented to ensure productivity. Despite being a great attack most insurance companies did not suffer since they don’t have a terror insurance policy. This led to closure of businesses due to damage incurred thus the government introduced the terror risk insurance Act that share loss between the government and insurance companies. Social media can be used as an emergency management tool. It helps send disaster warnings, receive victim requests, monitor activities that may create suspicion and also use the pictures to estimate incurred damages. It also helps to prevent the breakdown of communication that may arise due to reliance on a single communication tool. It can also be used to send information and receive feedback by wall posts or messages (Burger, 2014).
Companies need to consider the geographic location because in the case of a disaster this will prevent the destruction and damage that may be caused to both the main site and the backup center. The recovery point objective entails the amount of data that can be lost before significant damage is an experience by the business. The recovery time objective involves the time applications can be down before causing major problems. This affects the geographical location decision since if the data center is too far the data may not be mirrored in real-time. Hence this disaster could cause data loss. The amount of time one has to wait before data recovery will also affect whether to store data on premise or cloud. A cloud-based recovery system enables the back-up and recovery of data on a cloud-based platform. It provides both the recovery point objective and recovery time objective.
It provides storage space and continuously updates the designated systems with the installed software. It also allows the users to add, edit, and delete systems without having to worry about it being backed-up. It’s effective for recovery since the process is faster. One can use the automated tools to automate the in-build cloud recovery process thus the cost, price and time will less compared to other recovery processes. It’s more flexible since this recovery facilities can be easily moved to other locations. It could also decrease recovery effectiveness since it’s not easy to recover a large amount of data, this takes time and may also have impacts on the local systems. Cloud recovery is ideal for all businesses since small businesses can use public cloud in storing the data. For large companies with big data and sensitive information that may have greater leakage risk can use the private or hybrid cloud in storing data. The data is also accessible from anywhere with the internet (Chan, 2019).

Reference
Burger, K. (2014, September 11). What Have We Learned About Risk Management Since 9/11? Retrieved from https://www.insurancetech.com/security/what-have-we-learned-about-risk-management-since-9-11/a/d-id/1315630d41d.html?
Chan, M. (2019, June 17). How to improve your disaster recovery plan with the cloud. Retrieved from https://www.thorntech.com/2017/05/cloud-disaster-recovery/

Why choose Homework Ace Tutors

You Want Quality and That’s What We Deliver

Top Academic Writers

We’ve put together our writing team with care, choosing talented writers who shine in their fields. Each one goes through a tough selection process, where we look for folks with deep expertise in specific subjects and a solid history of academic writing. They bring their own mix of know-how and flair to the table, making sure our content hits the mark—packed with info, easy to read, and perfect for college students like you.

College Prices

We don’t do AI-written essays or copycat work—everything’s original. Competitive pricing is a big deal for us; we keep costs fair while delivering top-notch quality. Our writers are some of the best out there, and we charge rates that stack up well against other services. This means you get stellar content without draining your wallet. Our pricing is straightforward and honest, built to give you real value for your money. That’s why students turn to us for high-quality writing services that won’t break the bank.

100% Plagiarism-Free

Academic integrity is at the heart of what we do. Every paper starts from scratch, with original research and writing tailored just for you. We write 100% authentic—no plagiarism research essays. Our strict quality control process includes scanning every draft with top tools like SafeAssign and Turnitin, so you get a similarity score and proof of originality. We’re obsessive about proper citation and referencing too, crediting every source to keep things legit. It’s all about giving you peace of mind with content that meets the highest standards.

How it works

When you decide to place an order with Dissertation Writer, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went and the marking criteria grade you scored. You can leave a review recommending a writer for your class and course mates.