Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Question
Book Icon
Chapter B, Problem B4.1MBD
Program Plan Intro

Business Continuity Plan:

  • It details how an organization recovers business operations after a disaster.
  • It includes factors:
    • Critical system identification.
    • Business processes
    • Departments
    • Maximum time business could operate without functioning systems.
  • It has disaster recovery plans with additional plans that include business impact prioritization, notification plans and technology recovery strategies.
  • A business impact analysis identifies all critical functions of business and effect of disaster on them.
  • A notification service is built to notify people in emergency event.
  • Technology recovery strategies focus on prioritizing order for restoration of hardware, software, data and networking across organization.
  • If one of these four vital components is not functioning, entire system will be unavailable. 
  • A back up denotes exact copy of system’s information.
  • Recovery denotes ability of making system run in event of system failure and it includes information backup.

Blurred answer
Students have asked these similar questions
Use Excel Spreadsheets You are hosting an important event (Event examples: Graduation celebration, Family Reunion, Wedding, etc) and there will be about 100 guests (not fellow students) attending. The event will be for three (3) consecutive days. It is now up to you to make this a successful event. Over the next week you need to identify tasks, set priorities and come up with a plan to make this happen. You have initial budget of $100,000.00. You must identify at least five (5) areas/tasks where you need to spend this money for the three days of the event, example hall rental, equipment rental, food and drinks, entertainment, etc. You must create an initial budget sheet showing the distribution of the $100,000 for the three days.
Physical Security Survey   In this project you will perform a survey of the physical security at your school or workplace.   Identify vulnerabilities in the design and use of the following aspects of the facility:   Use of locking doors at main entrances   Access to sensitive areas   Cabling, communications, or computing equipment readily accessible   Video surveillance   Personnel badges   Loading area   Fire suppression   Make a list of issues you found. Include a categorization of risk and a suggested remedy to reduce the risk.   Do not enter any “employee only” areas during this exercise unless you have obtained permission in advance or are escorted by authorized personnel
The purpose of doing a risk analysis.

Chapter B Solutions

Business Driven Technology

Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning