Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!




Massive Data Loss, and Recovery Plan-Risk Management-Reality: Global

Financial Threats-

Information Drains









12-3-2017 Unit 8 Final Assignment

Completed By: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

Capella IAS5002 MS NSA Training

Dr. Susan Ferebee









NSA MS Student: Miss. Bayo Elizabeth Cary, AA, BA, MLIS

400 NW 1st Avenue, Apartment: 410,

Gainesville, FL 32601


Cell: 857-218-0146 USA

12-3-2017



Unit 8 Assignment: Not A Group Project

By Myself, from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



BC/ DRP Strategy and Directions:



BC/ DRP Strategy: “Draft Project Description and Scoring Guide” for more detailed information about the project, of which this assignment is a part.



On page 326 of your Essentials of Business Communication text, review Figure 10.24, "Components of Informal and Formal Reports."





Based on the information in the Overview and Scenario in the Team Activity project description, as a team create and submit a 6-10-page draft of a BC/DRP proposal.



Review Chapter 10, "Proposals and Formal Reports," in your textbook to ensure you have included all sections, including your APA reference list. Add appropriate visuals including charts and graphs:



Body of Research Paper:



Introduction: BC/DRP Formal Proposal and Research Paper:









·         Analyze various factors that need to be considered when developing a BC/DRP strategic technology for communicating in a globally diverse organization:







Disaster recovery services refer to services

aimed at enabling data backup, recovery, and retrieval. They can help enterprises to record critical business data files during the occurrence of natural calamities such as floods, tornados, and hurricanes or a sudden and unforeseen system failure. (M2 PressWire: Global Recovery, 2015, p.1)





12-3-2017



Email Communications: RE: Data Loss Prevention, and Recovery, Training, and Revision of Plans-Future Developments, and Staying Apprised: Developments in the Field:

To: Intl Corporate Staff

From: CIO, CEO, Director, and President: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



To Whom It May Concern:            







             I began, my research, into the evolving field, of IT security, and forensics, and how it is applicable, to our corporate working environment, with an academic research article, by: Cook (2015): “A Six-Stage Business Continuity and Disaster Recovery Planning Cycle”-that, he wrote, as part of the SUNY educational program, chose to organize, the: BC/DRP into a 6 stage, and formal review process (p. 24-34& p. 68):









1.      Governance and Structure (Cook, 2015, p. 24):





      When referring to the interactions involving, both: governance and structure, of an IT business, I think that the primary concern, is the understanding, that is held, by the entire organization. When a data loss disaster occurs, the management team, needs to present a united response, to the devastating loss. The cooperation, on all administrative levels, will help to speed, and bolster, a successful recovery process.



2.      Plan Initiation (Cook, 2015, p. 25):



           The recovery plan, for data loss, needs to be immediately implemented, the moment it is understood, that the data, has been stolen. If too much time passes, and the IT company, fails to respond, then, the outward presentation, is one of dishonesty. A compromise, to IT data, that should otherwise be held, private and confidential, is a serious problem, for any US, or Intl corporation. US laws, statutes, regulations-through the: SEC, require an immediate response, when data is lost, because, of the huge compromise, to the safety, and security, of the US economy.



3.      Business Impact and Risk Assessment (Cook, 2015, p. 25):



          An overall assessment, needs to be made, regarding, how the information was lost, where the data was stolen from, and on what date, and-an estimate, in-regards-to how much money, will be lost, due to the IT security failure, and data recovery time, required: “Business Impact Analysis” (Cook, 2015, p. 26). Data loss, is a common phenomenon, in the US. Data loss, happens soo often here, that, I think the novelty, has worn off, and-it is no longer responded to, in the same dramatic and reactive ways, that American companies initially did. It is strongly suggested, that the: “Business Impact Analysis,” be completed, and data loss recovery efforts, set into motion, within 24 hours (Cook, 2015, p. 26).



        Intl terror attacks in general, in the US, receive almost no response. America, is a shell-shocked country, that has come to expect, continued violence, and continued aggressions, from un-welcome immigrants, and visitors. The US government, could work pro-actively, to prevent some of the biggest Intl terror attacks, and instead-has chosen, to allow crazy people, into the US-and, to allow, those very same crazy people, to attack America, and Americans.



4.      Design and Update the Plan (Cook, 2015, p. 26):



             The disaster response plan, suggested by Cook (2015), in the article, referred to above: “A Six-Stage Business Continuity and Disaster Recovery Planning Cycle,” is detailed, as if the United States government itself, were responding to a mass, and endangering data loss. The Cook (2015), article presents, what I might consider to be, extreme provisions, such as (p. 26):



·         Back-Up Electric Generator;

·         Extra Food and Water Supply;

·         Off-Site Data Storage Areas;

·         Emergency Evacuation Plans. (Cook, 2015, p. 26-27)



5.      Testing and Training (Cook, 2015, p. 31):



          It has been suggested, in the: “Managerial,” section, of the Cook (2015), article: “A Six-Stage Business Continuity and Disaster Recovery Planning Cycle,” that the testing and training processes, for Emergency data recovery, and evacuation-post information security breach, should be expanded, beyond, the IT department (p. 31). As previously stated, in my review, in regards, to how to respond, to a drastic, and affective loss, of: private and secured information, that then entire corporation, and not just the IT department, must respond to the disaster, in-order-to organize, an effective, and an immediate response.



         Disaster response activities, and timing, must be tested and challenged. Plans, in an effective response, to any-given disaster, is a first step, and then, there has-to-be a realistic concern, regarding, the mitigating factors, as well. Cook (2015), states, that the current unfavorable: “geopolitical,” situation, is negatively impacting US businesses, and therefore, calls for, an aggressive response, on a global scale, to successfully, recover data, in a timely manner. The biggest problems occur, when a disaster happens, and then-everyone, just walks around casually, like they did not notice, that: “the sky is falling down.”



6.      Maintenance (Cook, 2015, p. 32):





         As data are an integral part of many business operations, securing them requires efficient and effective implementation of disaster recovery services (M2 PressWire, Global Recovery, 2015, p.1) The maintenance of a disaster recovery plan, must be predicated, on changes, in the Current environment-both: local, and global. Information, and data loss prevention techniques will alter, with changes to technology, and improvements, to security software, and other new preventative, and recovery means available.




·         Describe BC/DRP technologies and their appropriate use in communicating to stakeholders in geographically diverse locations:





The Worldwide Data Loss Prevention, and Data Recovery Realm:



There are a plethora, of: BC/DRP technologies, that could be utilized, for implementation, as a data recovery, emergency rescue plan. Below, I have provided, two examples:



CBL employs experts from varying disciplines coupled with proprietary techniques to retrieve data quickly and effectively from a wide array of affected media for customers ranging from large enterprises to home users. The company's data recovery laboratories are-located-in: 10 countries on five continents, including:



·         Brisbane,

·         Australia;

·         San Diego,

·         California, and;

·         Armonk, NY, USA;

·         Toronto, Canada;

·         Newcastle, United Kingdom;

·         Kaiserslautern, Germany;

·         Beijing, China;

·         Barbados, West Indies;

·         Curitiba, Brazil;

·         Tokyo, Japan, and;

·         Singapore. (M2 PressWire, CBL, 2005, p. 1)



Communications, technology, is specifically designed, to assist, in the communications, networks required, to recover lost data. Because, major data loss, should be viewed, as a: “disaster,’ in, and of-itself, metropolitan cities-like: London, who are almost completely dependent, upon information flows-as online data, to run the city, rely on a third party, data recovery system: “SunGard” (M2 PressWire, SunGard, 2003, p. 1):



Via the London Technology Centre, ScaleNet links into the SunGard national ATM network and the SunGard Global Network (SGN), hence delivering connectivity on a regional, national and global basis. This delivers increased flexibility for businesses as it allows them to move between any of SunGard's recovery centres including relocation out of their 'home' area completely, should they be affected by a wide-area incident. (M2 PressWire, SunGard, 2003, p. 1)



In an instance, of massive data loss, due to an: Intl terror attack, a natural disaster, and electric “Black-out,” etc.-major International cities, like: London, must be concerned, about-how they would function, if the collected pools, of information-were completely drained.



·         Cite research that supports BC/DRP communications technology recommendations:













Data Loss and Recovery Research:



             In 2005, CBL, was the: “World’s Leader,” in data recovery technology:



Founded in 1993, CBL Data Recovery Technologies Inc. (http:// www.cbltech.com.sg) is the leading international provider of digital data recovery services. Through its worldwide network of secure facilities, CBL provides this critical service to all sizes of businesses, institutions and government agencies as well as to individual clients who have experienced data loss under any circumstances. (M2 PressWire, CBL, 2005, p. 1)



Research, and the field of technology, is a fast-paced work environment. Software change. Computers alter. There are always new Apps. To remain apprised, of the developing security and forensic IT specialty field, it is necessary, to continue training, in the field. There are diplomas, and formal university educational programs, available, to train, for the IT field, and the various specializations:



Information Systems Security Engineering Professional (ISSEP/CISSP):

Developed in conjunction with the U.S. National Security Agency (NSA), the Information Systems Security Engineering Professional (ISSEP) certification covers integration of security methodologies and best practices into any-and-all information systems, including projects, applications and business practices. (Florentine, 2015)



However, to work, in the IT profession, certifications, are always required, to remain, up-to-date, with the latest technologies, and improvements, in the field. Continuing education, are required, for any research, and academically supported, professional degree-technology degrees, are no exception, to the: “Golden Rule, and General Standards.”





·         Employ critical and creative thinking to recommend a Business Continuity/Disaster Recovery strategy:



Business Continuity and Recovery Plans and Efforts:



Virtualization of storage devices will enhance the Global Disaster Recovery Services market for various reasons, which results in a decrease in the amount of hardware needed for disaster recovery services, thereby reducing the physical space utilization. (M2 PressWire, Global Recovery, 2015, p. 1)



IT departments, will be forced to comply, with US government regulations, for data protections, additionally-there must be realistic fears, regarding employees, who gain jobs, and wealth-simply to terrorize, the American economy, in hopes, of gaining the favors, of other countries, and Intl terror, in general. The emergence of virtualization technology in disaster recovery services is one of the key upcoming trends in this market (M2 PressWire, Global Recovery, 2015, p. 1).



·         Apply leadership strategies, for decision making, to benefit: individual and organizational performance:



Application of Critical Thinking to IT Management:



          Critical thinking, is the only way, to successfully manage, an IT project. In the past, when I have been challenged, by a complicated task, related to my academic studies, and the management, of: time lines, and due dates-I have always relied, upon my own unique intellect, to resolve, any-and-all issues, pertaining, to an on-time, and completed, final assignment. My academic accomplishments, are of a high quality, and I produce organized, and well-supported researched information, in large quantities.



                Critical thinking, is a learned skill, just like, writing a research paper, for most individuals. After years, of schooling, at a post-secondary level, my ability to surmount, stifling obstacles, to complete a complicated, and pressured homework assignment, have significantly improved. In the light, of a working environment, the same raw genius, is necessary-thinking, is a vital part, of any IT employment position. It is my hope, that by working hard, to apply myself, to my on-going studies, that I will soon, gain employment.



·         Data Recovery Plan Vulnerabilities:



The Data Recovery Plan Must Address Vulnerabilities:



          When, working, in an IT project management position, to develop a data loss prevention, and information recovery plan, there are certain: “vulnerabilities,” that are often-times, accidentally-over-looked (Lewis, 2005, p. 19):



·         Vulnerability of telephone and network terminators to falling water;

·         Employees personal life situations that limit emergency response;

·         The company's priority to utility companies and vendors;

·         Back-up vendors for key support services;

·         Accessibility of checks and purchase orders;

·         Exits requiring keys;

·         The needs of outside emergency organizations. (Lewis, 2005, p. 19)



·         Communicate effectively, in a professional manner, consistent with the standards and conventions, of: IAS: 





Professional Effective Communication Skills-The Root of Success:



                   In conclusion, this research paper, has been an inquiry, into the necessary steps, for: data loss prevention, and data recovery, should an information, and data security breach occur: “Business Recovery Planning (BRP)” (Lam, 2002, p. 19). Having, an agreed upon understanding, and then-a solid communications network, is a fundamental portion, of an emergency recovery, and evacuation plan-called, a: “Business Continuity Plan (BCP)” (Lam, 2002, p. 19):



BUSINESS CONTINUITY PLANNING CYCLE: BCP is a cyclical process; an organization should review its business continuity plan whenever it introduces changes to the business or alters its business priorities. (Lam, 2002, p. 19)







Taking, pro-active steps, to follow the US compliance: rules, statues, laws, and regulations-helps, in many ways, to preserve-and to protect, what could be lost-a financial devastation, to the American economy.



(Directions Continued: NOTE: The intent of the assignment is to research current business continuity/disaster recovery plan strategies and apply those strategies in the development of a formal communication document. Another goal is to better understand the importance, purpose, and components of formal reporting. A more detailed review of business continuity and disaster recovery processes, tools, methods and strategies will be covered in later IAS courses.)





          If you have, any additional questions, or suggestions, pertaining to, the information, that I have presented, in the above email-regarding, the need, of every US corporation-both: domestic, and International, to have a comprehensive, emergency data recovery plan, please do not hesitate, to contact me. I can be easily reached, by email: bayo_caryg1@yahoo.com You are also, welcome, to leave a voicemail, on my active, and working cell phone: 857-218-0146. I look forward, to hearing, your feedback. Thank you, for continuing to receive, my email communications, in-regards-to, pressing corporate issues. Thank you again.





Sincerely,







Miss. Bayo Elizabeth Cary, AA, BA, MLIS

The 400 Apartments

400 NW 1st Avenue, Apartment 410,

Gainesville, FL 32601









References







Cook, Jack. (2015). A Six-Stage Business Continuity and Disaster Recovery Planning Cycle. SAM Advanced Management Journal: SUNY Brockport. Vol. 80, Iss. 3. p. 23-33, and p. 68. Retrieved from http://web.b.ebscohost.com.library.capella.edu/ehost/pdfviewer/pdfviewer?vid=1&sid=646d2d34-c1b7-4420-a171-8ea7748ca67f%40sessionmgr101







Florentine, Sharon. (2015). 8 In Demand IT Security Certifications. Thinkstock. Retrieved from https://www.cio.com/article/2951115/certifications/8-most-in-demand-it-security-certifications.html







Lam, Wing. (2002). Continuity Planning: Will your business keep running if disaster strikes? Following the eight steps of the business continuity planning cycle can help you be prepared: Ensuring Business Continuity. IEEE. Iss. May/June. Retrieved from https://search-proquest-com.library.capella.edu/docview/206312830?accountid=27965







Lewis, Steven. (2005). BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS- THINGS OVERLOOKED.  EDPACS: The EDP Audit, Control and Security Newsletter. Vol. 33, Iss. 1. p. 19-20. Retrieved from https://search-proquest-com.library.capella.edu/docview/234907587?accountid=27965






 


M2 PressWire: CBL Data Recovery. (2005) CBL Data Recovery Technologies: Data Storage Institute collaborates with CBL Data Recovery Technologies on data storage media R&D; Partnership aimed at developing the state-of-the-art data recovery tool. M2 PressWire: Coventry. p. 1. Retrieved from https://search-proquest-com.library.capella.edu/computing/docview/445757131/fulltext/3E5CFF8B0E0646D5PQ/3?accountid=27965






M2 PressWire: Global Recovery. (2015). Global Disaster Recovery Services Market 2015-2019: Dominant Vendors are CA Technologies, HP, IBM, SunGard Data Systems & Verizon Communications.




M2 PressWire: SunGard. (2003). SUNGARD: SunGard Availability Services delivers UK's first dedicated business continuity network to combat business vulnerability. Retrieved from https://search-proquest-com.library.capella.edu/computing/docview/443804897/fulltext/3E5CFF8B0E0646D5PQ/7?accountid=27965



Comments

Popular posts from this blog

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2