Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!
Massive
Data Loss, and Recovery Plan-Risk Management-Reality: Global
Financial
Threats-
Information
Drains
12-3-2017 Unit 8
Final Assignment
Completed By: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
Capella IAS5002 MS
NSA Training
Dr. Susan Ferebee
NSA MS Student: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
400 NW 1st Avenue, Apartment: 410,
Gainesville, FL 32601
Email: bayo_caryg1@yahoo.com
Cell: 857-218-0146 USA
12-3-2017
Unit 8 Assignment: Not A Group Project
By Myself, from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
BC/ DRP Strategy and
Directions:
BC/ DRP Strategy: “Draft
Project Description and Scoring Guide” for more detailed information about the
project, of which this assignment is a part.
On page 326 of
your Essentials of Business Communication text, review
Figure 10.24, "Components of Informal and Formal Reports."
Based on the
information in the Overview and Scenario in the Team Activity project
description, as a team create and submit a 6-10-page draft of a BC/DRP
proposal.
Review Chapter 10,
"Proposals and Formal Reports," in your textbook to ensure you have
included all sections, including your APA reference list. Add appropriate
visuals including charts and graphs:
Body of Research Paper:
Introduction: BC/DRP Formal Proposal and Research Paper:
·
Analyze
various factors that need to be considered when developing a BC/DRP strategic
technology for communicating in a globally diverse organization:
Disaster recovery services
refer to services
aimed at enabling data backup, recovery, and retrieval. They can help
enterprises to record critical business data files during the occurrence of
natural calamities such as floods, tornados, and hurricanes or a sudden and unforeseen
system failure. (M2 PressWire: Global Recovery, 2015, p.1)
12-3-2017
Email Communications: RE: Data Loss Prevention,
and Recovery, Training, and Revision of Plans-Future Developments, and Staying
Apprised: Developments in the Field:
To: Intl Corporate Staff
From: CIO, CEO, Director, and President: Miss.
Bayo Elizabeth Cary, AA, BA, MLIS
To Whom It
May Concern:
I began, my research, into the
evolving field, of IT security, and forensics, and how it is applicable, to our
corporate working environment, with an academic research article, by: Cook
(2015): “A Six-Stage Business Continuity and Disaster Recovery Planning Cycle”-that,
he wrote, as part of the SUNY educational program, chose to organize, the:
BC/DRP into a 6 stage, and formal review process (p. 24-34& p. 68):
1.
Governance and Structure (Cook, 2015, p. 24):
When referring to the interactions involving, both: governance and
structure, of an IT business, I think that the primary concern, is the
understanding, that is held, by the entire organization. When a data loss
disaster occurs, the management team, needs to present a united response, to
the devastating loss. The cooperation, on all administrative levels, will help
to speed, and bolster, a successful recovery process.
2.
Plan Initiation (Cook, 2015, p. 25):
The recovery plan, for data loss,
needs to be immediately implemented, the moment it is understood, that the
data, has been stolen. If too much time passes, and the IT company, fails to
respond, then, the outward presentation, is one of dishonesty. A compromise, to
IT data, that should otherwise be held, private and confidential, is a serious
problem, for any US, or Intl corporation. US laws, statutes,
regulations-through the: SEC, require an immediate response, when data is lost,
because, of the huge compromise, to the safety, and security, of the US
economy.
3.
Business Impact and Risk Assessment (Cook, 2015, p. 25):
An overall assessment, needs to be
made, regarding, how the information was lost, where the data was stolen from,
and on what date, and-an estimate, in-regards-to how much money, will be lost,
due to the IT security failure, and data recovery time, required: “Business Impact
Analysis” (Cook, 2015, p. 26). Data loss, is a common phenomenon, in the US.
Data loss, happens soo often here, that, I think the novelty, has worn off,
and-it is no longer responded to, in the same dramatic and reactive ways, that
American companies initially did. It is strongly suggested, that the: “Business
Impact Analysis,” be completed, and data loss recovery efforts, set into
motion, within 24 hours (Cook, 2015, p. 26).
Intl terror attacks in general, in the
US, receive almost no response. America, is a shell-shocked country, that has
come to expect, continued violence, and continued aggressions, from un-welcome
immigrants, and visitors. The US government, could work pro-actively, to
prevent some of the biggest Intl terror attacks, and instead-has chosen, to
allow crazy people, into the US-and, to allow, those very same crazy people, to
attack America, and Americans.
4.
Design and Update the Plan (Cook, 2015, p. 26):
The disaster response plan,
suggested by Cook (2015), in the article, referred to above: “A Six-Stage
Business Continuity and Disaster Recovery Planning Cycle,” is detailed, as if
the United States government itself, were responding to a mass, and endangering
data loss. The Cook (2015), article presents, what I might consider to be,
extreme provisions, such as (p. 26):
·
Back-Up Electric Generator;
·
Extra Food and Water Supply;
·
Off-Site Data Storage Areas;
·
Emergency Evacuation Plans. (Cook, 2015, p.
26-27)
5.
Testing and Training (Cook, 2015, p. 31):
It has been suggested, in the:
“Managerial,” section, of the Cook (2015), article: “A Six-Stage Business
Continuity and Disaster Recovery Planning Cycle,” that the testing and training
processes, for Emergency data recovery, and evacuation-post information
security breach, should be expanded, beyond, the IT department (p. 31). As
previously stated, in my review, in regards, to how to respond, to a drastic,
and affective loss, of: private and secured information, that then entire
corporation, and not just the IT department, must respond to the disaster,
in-order-to organize, an effective, and an immediate response.
Disaster response activities, and
timing, must be tested and challenged. Plans, in an effective response, to
any-given disaster, is a first step, and then, there has-to-be a realistic
concern, regarding, the mitigating factors, as well. Cook (2015), states, that
the current unfavorable: “geopolitical,” situation, is negatively impacting US
businesses, and therefore, calls for, an aggressive response, on a global
scale, to successfully, recover data, in a timely manner. The biggest problems
occur, when a disaster happens, and then-everyone, just walks around casually,
like they did not notice, that: “the sky is falling down.”
6.
Maintenance (Cook, 2015, p. 32):
As data are
an integral part of many business operations,
securing them requires efficient and effective implementation of disaster recovery services (M2 PressWire, Global
Recovery, 2015, p.1) The maintenance of a disaster recovery plan, must be
predicated, on changes, in the Current environment-both: local, and global.
Information, and data loss prevention techniques will alter, with changes to
technology, and improvements, to security software, and other new preventative,
and recovery means available.
·
Describe BC/DRP
technologies and their appropriate use in communicating to stakeholders in
geographically diverse locations:
The Worldwide Data Loss Prevention, and Data Recovery Realm:
There are a plethora, of: BC/DRP
technologies, that could be utilized, for implementation, as a data recovery,
emergency rescue plan. Below, I have provided, two examples:
CBL
employs experts from varying disciplines coupled with proprietary techniques to
retrieve data quickly and
effectively from a wide array of affected media for customers ranging from
large enterprises to home users. The company's data recovery laboratories
are-located-in: 10 countries on five continents, including:
·
Brisbane,
·
Australia;
·
San Diego,
·
California, and;
·
Armonk, NY, USA;
·
Toronto, Canada;
·
Newcastle, United Kingdom;
·
Kaiserslautern, Germany;
·
Beijing, China;
·
Barbados, West Indies;
·
Curitiba, Brazil;
·
Tokyo, Japan, and;
·
Singapore.
(M2 PressWire, CBL, 2005, p. 1)
Communications, technology, is
specifically designed, to assist, in the communications, networks required, to
recover lost data. Because, major data loss, should be viewed, as a:
“disaster,’ in, and of-itself, metropolitan cities-like: London, who are almost
completely dependent, upon information flows-as online data, to run the city,
rely on a third party, data recovery system: “SunGard” (M2 PressWire, SunGard,
2003, p. 1):
Via the London Technology Centre,
ScaleNet links into the SunGard national ATM network and the SunGard Global Network
(SGN), hence delivering connectivity on a regional, national and global basis.
This delivers increased flexibility for businesses as it allows them to
move between any of SunGard's recovery centres including relocation out of their
'home' area completely, should they be affected by a wide-area incident. (M2
PressWire, SunGard, 2003, p. 1)
In an instance, of massive data loss,
due to an: Intl terror attack, a natural disaster, and electric “Black-out,”
etc.-major International cities, like: London, must be concerned, about-how
they would function, if the collected pools, of information-were completely
drained.
·
Cite research that
supports BC/DRP communications technology recommendations:
Data Loss and Recovery Research:
In 2005, CBL, was the: “World’s
Leader,” in data recovery technology:
Founded
in 1993, CBL Data Recovery Technologies Inc. (http://
www.cbltech.com.sg) is the leading international provider of digital data recovery services.
Through its worldwide network of secure facilities, CBL provides this critical
service to all sizes of businesses,
institutions and government agencies as well as to individual clients who have
experienced data loss under
any circumstances. (M2 PressWire, CBL, 2005, p. 1)
Research, and the field of technology, is a
fast-paced work environment. Software change. Computers alter. There are always
new Apps. To remain apprised, of the developing security and forensic IT
specialty field, it is necessary, to continue training, in the field. There are
diplomas, and formal university educational programs, available, to train, for
the IT field, and the various specializations:
Information Systems Security Engineering
Professional (ISSEP/CISSP):
Developed in conjunction with the U.S. National Security Agency
(NSA), the Information Systems Security Engineering Professional (ISSEP)
certification covers integration of security methodologies and best practices
into any-and-all information systems, including projects, applications and
business practices. (Florentine, 2015)
However, to work, in the IT profession,
certifications, are always required, to remain, up-to-date, with the latest
technologies, and improvements, in the field. Continuing education, are
required, for any research, and academically supported, professional
degree-technology degrees, are no exception, to the: “Golden Rule, and General
Standards.”
·
Employ critical and
creative thinking to recommend a Business Continuity/Disaster Recovery strategy:
Business Continuity and Recovery
Plans and Efforts:
Virtualization
of storage devices will enhance the Global Disaster Recovery Services market for various
reasons, which results in a decrease in the amount of hardware needed for disaster recovery services, thereby reducing the
physical space utilization. (M2 PressWire, Global Recovery, 2015, p. 1)
IT departments,
will be forced to comply, with US government regulations, for data protections,
additionally-there must be realistic fears, regarding employees, who gain jobs,
and wealth-simply to terrorize, the American economy, in hopes, of gaining the
favors, of other countries, and Intl terror, in general. The emergence of virtualization technology in disaster recovery services is one of the key
upcoming trends in this market (M2 PressWire, Global Recovery, 2015, p. 1).
·
Apply leadership
strategies, for decision making, to benefit: individual and organizational
performance:
Application of Critical Thinking to
IT Management:
Critical thinking, is the only way, to
successfully manage, an IT project. In the past, when I have been challenged,
by a complicated task, related to my academic studies, and the management, of:
time lines, and due dates-I have always relied, upon my own unique intellect,
to resolve, any-and-all issues, pertaining, to an on-time, and completed, final
assignment. My academic accomplishments, are of a high quality, and I produce
organized, and well-supported researched information, in large quantities.
Critical thinking, is a learned
skill, just like, writing a research paper, for most individuals. After years,
of schooling, at a post-secondary level, my ability to surmount, stifling
obstacles, to complete a complicated, and pressured homework assignment, have
significantly improved. In the light, of a working environment, the same raw
genius, is necessary-thinking, is a vital part, of any IT employment position.
It is my hope, that by working hard, to apply myself, to my on-going studies,
that I will soon, gain employment.
·
Data
Recovery Plan Vulnerabilities:
The Data Recovery Plan Must Address
Vulnerabilities:
When, working, in an IT project
management position, to develop a data loss prevention, and information
recovery plan, there are certain: “vulnerabilities,” that are often-times,
accidentally-over-looked (Lewis, 2005, p. 19):
·
Vulnerability
of telephone and network terminators to falling water;
·
Employees
personal life situations that limit emergency response;
·
The
company's priority to utility companies and vendors;
·
Back-up
vendors for key support services;
·
Accessibility
of checks and purchase orders;
·
Exits
requiring keys;
·
The needs of outside emergency organizations. (Lewis, 2005,
p. 19)
·
Communicate
effectively, in a professional manner, consistent with the standards and
conventions, of: IAS:
Professional Effective
Communication Skills-The Root of Success:
In conclusion, this research
paper, has been an inquiry, into the necessary steps, for: data loss
prevention, and data recovery, should an information, and data security breach
occur: “Business Recovery Planning (BRP)” (Lam, 2002, p. 19). Having, an agreed
upon understanding, and then-a solid communications network, is a fundamental
portion, of an emergency recovery, and evacuation plan-called, a: “Business
Continuity Plan (BCP)” (Lam, 2002, p. 19):
BUSINESS
CONTINUITY PLANNING CYCLE: BCP is a cyclical process; an organization
should review its business continuity plan whenever it introduces
changes to the business or alters its business priorities. (Lam, 2002, p. 19)
Taking,
pro-active steps, to follow the US compliance: rules, statues, laws, and
regulations-helps, in many ways, to preserve-and to protect, what could be
lost-a financial devastation, to the American economy.
(Directions Continued: NOTE: The intent of the assignment is to research
current business continuity/disaster recovery plan strategies and apply those
strategies in the development of a formal communication document. Another goal
is to better understand the importance, purpose, and components of formal
reporting. A more detailed review of business continuity and disaster recovery
processes, tools, methods and strategies will be covered in later IAS courses.)
If you have, any additional
questions, or suggestions, pertaining to, the information, that I have
presented, in the above email-regarding, the need, of every US
corporation-both: domestic, and International, to have a comprehensive,
emergency data recovery plan, please do not hesitate, to contact me. I can be
easily reached, by email: bayo_caryg1@yahoo.com You are also, welcome, to leave a voicemail, on my active, and
working cell phone: 857-218-0146. I look forward, to hearing, your feedback.
Thank you, for continuing to receive, my email communications, in-regards-to,
pressing corporate issues. Thank you again.
Sincerely,
Miss. Bayo Elizabeth
Cary, AA, BA, MLIS
The 400 Apartments
400 NW 1st
Avenue, Apartment 410,
Gainesville, FL 32601
References
Cook, Jack. (2015). A
Six-Stage Business Continuity and Disaster Recovery Planning Cycle. SAM
Advanced Management Journal: SUNY Brockport. Vol. 80, Iss. 3. p. 23-33, and p.
68. Retrieved from http://web.b.ebscohost.com.library.capella.edu/ehost/pdfviewer/pdfviewer?vid=1&sid=646d2d34-c1b7-4420-a171-8ea7748ca67f%40sessionmgr101
Florentine, Sharon. (2015). 8 In
Demand IT Security Certifications. Thinkstock. Retrieved from https://www.cio.com/article/2951115/certifications/8-most-in-demand-it-security-certifications.html
Lam, Wing. (2002). Continuity
Planning: Will
your business keep running if disaster strikes? Following the eight steps of
the business continuity planning cycle can help you be prepared: Ensuring
Business Continuity. IEEE. Iss. May/June. Retrieved from https://search-proquest-com.library.capella.edu/docview/206312830?accountid=27965
Lewis, Steven. (2005). BUSINESS CONTINUITY AND DISASTER RECOVERY PLANS- THINGS OVERLOOKED. EDPACS: The EDP Audit, Control and Security Newsletter. Vol. 33, Iss. 1. p. 19-20. Retrieved from https://search-proquest-com.library.capella.edu/docview/234907587?accountid=27965
M2 PressWire: CBL Data Recovery. (2005) CBL Data Recovery Technologies: Data Storage Institute collaborates with CBL Data Recovery Technologies on data storage media R&D; Partnership aimed at developing the state-of-the-art data recovery tool. M2 PressWire: Coventry. p. 1. Retrieved from https://search-proquest-com.library.capella.edu/computing/docview/445757131/fulltext/3E5CFF8B0E0646D5PQ/3?accountid=27965
M2 PressWire: Global Recovery. (2015). Global Disaster
Recovery Services Market 2015-2019: Dominant Vendors are CA Technologies, HP,
IBM, SunGard Data Systems & Verizon Communications.
Retrieved from https://search-proquest-com.library.capella.edu/computing/docview/1644411473/fulltext/3E5CFF8B0E0646D5PQ/4?accountid=27965
Comments
Post a Comment