Premium Essay

Capstone Disaster Plan Final

In:

Submitted By popeye243
Words 417
Pages 2
Disaster Plan
The purpose of this disaster plan is to provide a working procedure plan for Central Arkansas Family Doctors, PLLC in the event of a catastrophic event that disables the medical and business functions of the medical practice. Also for a network failure in the system for when the network gets corrupted by DoS or Malware acts. This plan is to provide continued operations for Central Arkansas Family Doctors, PLLC to be able to continue business with little interruptions as possible. How we would prepare for a disaster is to have a backup system for the medical information of the employees, clients, and files. We would prefer that Central Arkansas Family Doctors, PLLC perform incremental backups daily. We would have other locations or resources that would have duplicates of the system and files of the clients, employees, and physicians. The reason why we would have a separate location is for a possibility disaster happening. The resources that we would use to back up the information is CrashPlan—Data and Security and Protection software. The CrashPlan addresses regulatory data security and privacy concerns by employing a multi-layered security model that includes transmission security, access, password security, and encryption. Also the backup information is stored in one of our data centers located in Little Rock, AR at Regions Bank. The media that we are using is HIPAA Compliant Hosting—Disaster Recovery Cloud. Another way we would have risk management for the practice is that we have insurance for the business for example flooding, earthquake, or tornado insurance.
Now procedures that will be done after a possible natural disaster is that the office manager of Central Arkansas Family Doctors, PLLC should contact all the employees regarding the extent of the disaster and mention what actions that will take place in short term until business is back up

Similar Documents

Premium Essay

Capstone Project

...Unit 1: Introduction to the Capstone Project Recommended Activities for This Unit Instructor Functions|Student Tasks| • Discuss the course structure layout. • Present an overview of the capstonecase study or Request for Proposal (RFP).|Discuss the capstone project or Request for Proposal (RFP) to identify the following: o Objectives and scope o Requirements and specifications o The resources, such as human, time, funds, space, and tools, required to deliver the product o Tasks o Deliverables o Milestones• Identify major milestones and individual tasks.| • Explain how to launch and configure Microsoft Office Project 2003.|Explore Microsoft Office Project 2003.| • Discuss project planning and management using Microsoft Office Project 2003 and relate the software to the capstone project. o Define the basic terminology of project management. o Explain the project management life cycle. o Explain project management knowledge areas.|Define project management terminology and apply the terminology to the capstone project.| • Organize project teams. o Define team member roles and responsibilities.|Select teams.• Define team member roles and responsibilities.• Elect peers to fill appropriate roles.| Network Development Capstone Project Unit 1 Instructor Functions|Student Tasks| • Identify the key components of the capstone project. o Discuss the key requirements for the successful completion of the project. See Appendix...

Words: 2321 - Pages: 10

Premium Essay

Capstone Project

...Authorization Professional Capstone ------------------------------------------------- Security Authorization Project Scenario: You are a newly employed Security Analyst (consultant) at ACE Technologies, LLC. ACE just won an Information Security contract with a U.S. Federal Agency (Center for Health Management - CHM). The contract requires ACE to deliver several Security Operations and Management Services, security assessments being one of them. As the new ACE consultant you have been assigned to assess one of CHM’s Information Systems (IS) in the Health Evaluation Dept, which consists of five thousand (5000) Windows 2008 and Windows 2012 servers that are similarly configured and built of the same hardware (Dell Blade Servers). This IS primarily stores files and processes privacy (PII) data in the form of employee and customer health records, and credit card, as well as procurement information that includes contracts and financial data. Task: Using the NIST 800-37 Rev1 RMF assess the IS and determine the system classification/category, impact level, existing and applicable controls, and recommendations to enhance the security posture. You will develop a Security Authorization Package consisting of the required documents below and one (1) additional document from the list of optional documents. Use all tools and methods available to you to obtain information and assess the Information System. Required Documents: (MUST BE CREATED) * System Security Plan (SSP) * Security...

Words: 354 - Pages: 2

Premium Essay

Career Goals

...1. Identify the career goals for which you are preparing. 2. Describe the most likely ways in which technological developments will affect those career goals, in both the short- and long-term future. 3. Develop an educational plan to help you reach those goals. In completing this assignment, consult and use information from the Occupational Outlook Handbook (http://www.bls.gov/ooh/). This information is provided by the U.S. Department of Labor. Feel free to draw as well on any or all of the materials you have read during this course. The pressure for success is never greater than when you have had a family of your own. In this case, endowed with two children and a husband, being proactive to achieve success is important to me. I have a year and four months remaining of my enlistment with the United States Air Force. I have to make certain that I am prepared to transition to a civilian life smoothly. The goals I am currently preparing for include finishing my bachelor’s degree in natural science and master’s degree in business administration. I hope to work for the National Weather Service or at an airport as a weather observer or forecaster after the completion of my bachelor’s degree. With this degree accompanied with my nine years of weather forecasting in the military, my skills and experience should warrant marketability. Now, technological development in the improvements of radar, models, and satellite availability increases the accuracy of the weather forecast...

Words: 927 - Pages: 4

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10

Premium Essay

Capstone Final Project

...NSA Capstone Greenway Bank Project Presented by: CISSA Amed Aplicano, Ivan Armendariz, Chris Christopher, Steven Smedley, Samuel Holman Table of Content 1. Table of content…………………………………………………………………………..……1 2. Project Charter………………………………………………………………………………....2-11 3. Change Management Plan…………………………………………………………………12-15 4. Change Management Procedure……………………………………………………….16 5. Project Schedule and Gantt Chart………………………………………………………17 6. Network Activity Diagram………………………………………………………………….18-20 7. Work Breakdown Structure……………………………………………………………….21 8. WBS Dictionary………………………………………………………………………………….22-24 9. Network Logical Diagram………………………………………………………………......25-26 10. Network Physical Diagram………………………………………………………………….27 11. Server Configuration…………………………………………………………………………..28-30 12. Active Directory Schema…………………………………………………………………….31 13. Client Configuration……………………………………………………………………………32-33 14. Infrastructure Configuration……………………………………………………………….34 15. Budget/Bill of materials……………………………………………………………………….35-37 16. Quality Plan…………………………………………………………………………………………38-40 17. Risk Management Plan………………………………………………………………………..41-48 18. Meeting Minutes…………………………………………………………………………………49-66 19. Final presentation slides……………………………………………………………………..67-77 20. Progress report………………………………………………………………………………….78- 1 NT2799.U1.HO4 Greenway Bank: Project ______________________________________________________________________________ Greenway Bank Project NSA Capstone Project Charter __...

Words: 12136 - Pages: 49

Free Essay

It Sec Capstone

...resubmission. Submit to: Western Governors University Attn.: Assessment Delivery Department 4001 South 700 East, Suite 700 Salt Lake City, Utah 84107-2533 Capstone Project Cover Sheet Capstone Project Title: Small Business Network Upgrade Student Name: Degree Program: BSIT Mentor Name: Laura Creamer / Les Vance Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Report Summary (Introduction) ................................................................................................... 1 Goals and Objectives..................................................................................................................................... 6 Project Timeline (Appendix 2)..................................................................................................................... 11 Project Development .................................................................................................................................. 13 References .................................................................................................................................................. 17 Appendix 1: Competency Matrix ................................................................................................................ 18 Appendix 2: Project Plan and Timeline ....................................................................................................... 20 Appendix 3: Red Hat Enterprise Linux...

Words: 6682 - Pages: 27

Premium Essay

Professional Development

...HN299-01: Associate’s Capstone in Human Services 1502A Unit 9 Final Project Professional Development Trinise Walton Kaplan University A Professional Development As a retiring supervisor of the child welfare service department, I will be providing valid information in this paper to those that are new in the human service field. This information will include how to use effective coordination, the best methods of providing direct service to clients, why it is so important to advocate for families and communities as well as agencies. Also what has been the most important lessons I have learned during my career. In all areas of the human services, there is a center point for helping others to find safety, health and success within their own lives. Remember the work is vital and valid, which is often inspirational enough. Careers in this field are, ideal because the job requirements revolve around the development of personal and professional relationships with clients, whether children, adults, or elderly. However, working in human services does provide specialize training through schooling or on-the-job- to help the professional. The human service careers falls into two categories: social services and mental health services. Social services specialists assist people on improving their quality of life. Mental health specialists deals directly with individuals who are trying to change their behavior or accomplish a better mental outlook. However, if a person is trying to...

Words: 1862 - Pages: 8

Premium Essay

Part 1,2,3 Decisions in Paradise

...will build upon the previous section. The author will attempt to define issues that effect business, highlight the forces involved in the problem, describe the organizational and environmental obstacles, and finally apply critical thinking in the decision-making process. Defining the Issues The Dillard's organization is looking to establish a new manufacturing plant on the island of Kava, in the South Pacific. The Dillard’s organization hopes that this move will be beneficial to both Kava and the Dillard’s shareholders. This decision to branch out to Kava will require careful planning and consideration of all the present issues. Issues present such as: natural disasters, health risks, and internal and external forces, create a challenge for Dillard’s Incorporated. Dillard’s desperately needs to develop a plan to have a greater presence on Kava. Forces and Obstacles Involved There are several internal and external forces involved in the decision to set up a manufacturing plant in Kava. External forces for example, environmental obstacles, present in the South Pacific include: tornadoes, hurricanes and typhoons, floods, fires, earthquakes, petroleum spills, volcanic eruptions, and the spread of disease. Internal forces such as ethical issues, human resources, and the organizational process will be considered as well. Many ethical issues within a global organization can develop such as conflicts between the...

Words: 2595 - Pages: 11

Premium Essay

Student

...Decision Making MGT 350 Problem Formulation and Identification Problem formulation and identification is an important part of any organization due to the limitless amount of problems that can transpire. By having a proper plan of action to help identify problems, an organization can quickly implement the needed procedures to alleviate it whether it is personnel or resources. The organization I represent, Shannon Missionary Baptist Church, is linked to another other organization that can have problems to arise at any given time and problem formulation and identification methods are as crucial in church as with any other organization. We have formulated a method of problem identification internally and try and use our handbook, the Bible, to the letter. Our handbook offers unswerving directions on how every member of the organization is to carry out his or her services, the organizations purpose and goals, the rules and regulations, and also the behavior of the organization and its members. When any member of the organization notices a problem or issue, it is his or her responsibility to report that problem to other members so that a meeting can be held to handle it swiftly. Our organization handles all problems openly, with all its members, allowing each individual to express their concerns about the problem and then a vote is made. The decision of what action to take to deal with the problem is decided by the majority vote. Compare and Contrast of Decision Making ...

Words: 1467 - Pages: 6

Premium Essay

Syllubus

...|[pic] |SYLLABUS | | |Axia College/College of Criminal Justice and Security | | |CJS/250 Version 2 | | |Introduction to Security | Copyright © 2009, 2007 by University of Phoenix. All rights reserved. Course Description This course is an introduction to contemporary security practices and programs. Students will study the origins of private security, its impact on our criminal justice system, and the roles of security personnel. Students will also examine the growth and privatization of the security industry, and study the elements of physical security including surveillance and alarm systems. The course will cover legal and liability issues, which determine the extent of private security authority as well as its limitations. This course will also focus on the current and future integration of private security services in law enforcement agencies. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: ...

Words: 1941 - Pages: 8

Premium Essay

Nature of Emergencies

...Emergency services at scene http://www.orsgroup.com/wp-content/uploads/2014/05/emergency-services-banner.jpg Some examples of these are the use of the voluntary sector not just being regarded, but also being given a role to play in emergencies, statutory or not with regard being given to the original reason they are not currently included. There could amendments made to identify “safe supporting roles” in which to use willing civilian bystanders providing extra manpower and releasing pressure in the response ( Dynes 1994, Drabek 1986). Emergency planning in the UK: a unique perspective. Part A) Nature of Emergencies Joshua ST.Lyon 1370 Words The 1953 floods are an early example of a response under the Civil Defence Act (1948). The response for this event was not effectively backed by the Civil Defence Act (1948) which did not provide many statutory responsibilities. The local authorities could only carry out normal peacetime activities, not those associated with a state of emergency (Grieve 1959). The response from the services for this event was chaotic as work carried out was not done with thought as to whose function it was. The agencies were overwhelmed by the scale of the incident and the remoteness of the locations cut off by flooding (Delderfield and Carnegie 1969, Grieve 1959). The nature of this incident and similar ones of the day was very much one of miscommunication or lack thereof, an underprepared and equipped set of emergency services and a reliance...

Words: 3814 - Pages: 16

Premium Essay

Wgu Capstone

...on computers today. Clients and the government expect business to maintain the availability, integrity and confidentiality of their information. The project was created to address the importance of Information Security Management and compliance for businesses in the financial sector. ABC Loans are a small independently owned payday loan company. The client was concerned about the recent penetration of local business networks and wanted me to perform an assessment on his network and determine the vulnerable areas of his networks and the recommendations for making it more secure and GLBA compliant; now that the assessment is completed the client is aware of the vulnerabilities and the areas where they are not meeting GLBA requirements. My capstone will focus on the steps that will assure compliance for (ABC Loans). Payday loan companies are regulated by the Federal Deposit Insurance Corporation, and they require that financial institutions adhere to their guidelines. The points I will focus on are as follows: • Business/IT problem under investigation: Payday loan companies must comply with the Grahm-Leach-Bliley Act (GLBA). Another name for the GLBA is the Financial...

Words: 8774 - Pages: 36

Premium Essay

Test Paper

......................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details ................................................................................................................................. 10 Topology .....................................................................................................

Words: 12729 - Pages: 51

Premium Essay

Problem Formulation and Identification

...RUNNING HEAD: DECISION-MAKING January 11, 2009 Problem Formulation and Identification Every organization uses its own decision-making style. Some organizations prefer to use a rational style, which centers on facts and figures, and logical and scientific approaches to their problems. Other companies use an intuitive style, which focuses on emotional aspects of problems and gut feelings. Recently, a group of business students observed how decisions are typically made at their own places of employment. Kori at Prescription Solutions, Jacob at Combined Arms Training Center, Isela at Housing Authority of the City of El Paso, and Micah at Brown-Forman where each examined the strategy most often employed at their organizations. It was found that while each has its own particular style, there were many similarities. These working students also found that each style uses its own set of strengths and weaknesses, and explored how a problem can be described to stakeholders in a manner that is sensitive to their perspectives with various style approaches. Rational Decision-Making Rational decision-making is “a deliberate and logical approach” (Robbins, 2004, p. 21). When faced with a decision, a rational thinker will “emphasize facts, details, and rational cause-effect logic” (Robbins, 2004, p. 21). When a decision must be made, Prescription Solutions’ upper management executives consider three logical business factors: customer satisfaction...

Words: 1871 - Pages: 8

Premium Essay

Amazon Avaluation

...[pic] |Syllabus Axia College/School of Business XBIS/219 Business Information Systems | |Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. This includes a broad foundation for both technical and nontechnical business professionals. Special emphasis is placed on how information is used by different types of businesses across different industries. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. The instructor policies are VERY important. The late policies, participation and discussion requirements, and other important information to ensure your best experience in this class are detailed in that document. Make sure you read this document in full immediately to help avoide missed requirements and missed points. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. PLEASE NOTE: Many of the assignments in this class have been customized, which means...

Words: 3946 - Pages: 16