Develop a disaster recovery plan using ISO 27031 or ISO 24762 template

 Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  1. Important: This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  2. Introduction
  3. Roles and Responsibilities
  4. Incident Response
  5. Plan Activation
  6. Document History
  7. Procedures

Your paper should meet the following requirements: 100% original content

  • Be approximately 4 to 6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least four scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Summary

 

There are TWO tasks that you would need to do( they are separate): 

Task 1:

Write a summary of the below point for a  total of 300 words 

 Read four (4) academically reviewed articles on Net Neutrality and complete the following activities:

Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses. Do you believe net neutrality will lead to IT efficiency? Why or why not? 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index. 

Discussion question, 350 words and 2 references.

Write an analytical summary of your learning outcomes from chapters 9 and 10. In addition to your analytical summary, address the following:

1.     As a manager, discuss how you would use or have used the concepts presented in chapters 9 and 10.

2.     Why might managers find a flexible-budget analysis more informative than static-budget analysis?

3.     How might a manager gain insight into the causes of flexible-budget variances for direct materials, labor, and overhead?

paper2

 

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure, and information processing when considering cloud computing within an enterprise risk management framework?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

cloud computing

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

Discussion

There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

How does software defined networking affect the management of a VPN in comparison to traditional VPN management? Does it improve or does it not improve the management of a VPN?

As threats and attacks are a continuing issue, what new technologies/methods do you think should be implemented to protect a VPN?

Discussion 2.0

 

  • Distinguish among character, block, and stream ciphers.
     
  • Specify when to use each.
  • 5 pages.

Note: Remember to cite any sources you use,  including your textbook, using the Strayer Writing Standards format. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course.