Premium Essay

Risk Management Plan for Capstone

In:

Submitted By DragonBaneXIII
Words 764
Pages 4
------------------------------------------------- -------------------------------------------------

-------------------------------------------------
Risk Management Plan
-------------------------------------------------

Project Manager:

Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 09/27/2014 | | First Draft | | | | | | | | | | | | | | | | |

Table of Contents Purpose and Scope 1 Risk Plan Objectives 1 Deliverables Produced 1 Deliverable 1: 1 Deliverable 2: 1 Deliverable 3: 2 Project Risks 2 Risk I 2 Risk II 2 Risk III 2 Disaster Recovery Plan 2 Types of Teams 2 In the Event of a Disaster 2 Recovery Scenarios 3 Recovery Activities 3

Purpose and Scope
The risks that we can incur for this project are as follows: Injury when installing cables and towers, possible electrical issues with a number of systems drawing power around the same time, someone tapping into the company’s network as we slowly bring it up before it’s fully secured, possible attacks on the servers as they come online, or critical failure of servers as they are brought online. We are going to go over these and how we will mitigate the risks from a high risk to a lower risk.

Risk Plan Objectives
This project will meet the following objectives: * Objective 1 – Working in pairs so that workers can check over each other’s work to make sure it is done right the first time without injury. * Objective 2 – Before bringing networking components online making sure that they have proper security installed at maximum protection level and then slowly bring it down as the network is brought online. * Objective 3 – Receive the maximum load capabilities for the buildings so that we are not drawing too much power from the grid and to pre-test app computer components to make sure they are in working order before installing

Similar Documents

Premium Essay

Business Plan

...UNLV Theses/Dissertations/Professional Papers/Capstones Summer 2011 SunShine Café: A Breakfast Restaurant Business Plan Lillian I. Burrow Follow this and additional works at: http://digitalscholarship.unlv.edu/thesesdissertations Part of the Business Administration, Management, and Operations Commons, Entrepreneurial and Small Business Operations Commons, and the Food and Beverage Management Commons Repository Citation Burrow, Lillian I., "SunShine Café: A Breakfast Restaurant Business Plan" (2011). UNLV Theses/Dissertations/Professional Papers/ Capstones. Paper 1093. This Professional Paper is brought to you for free and open access by Digital Scholarship@UNLV. It has been accepted for inclusion in UNLV Theses/ Dissertations/Professional Papers/Capstones by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact digitalscholarship@unlv.edu. SunShine Café: A Breakfast Restaurant Business Plan By Lillian I Burrow A professional paper in partial fulfillment of the requirements for the Master of Hospitality Administration Department of Hotel Administration Pro Paper Chairs Carola Raab Yen-Soon Kim Summer 2011 William F. Harrah College of Hotel Administration University of Nevada, Las Vegas SUNSHINE CAFÉ Table of Contents Part 1 Introduction ............................................................................................................4 Purpose......................................

Words: 577 - Pages: 3

Premium Essay

Fis 250 Complete Class

...SUPPORT@ACTIVITYMODE.COM FIS 250 COMPLETE CLASS FIS 250 Week 1 CheckPoint: Risk Management Methods FIS 250 Week 1 DQs part 1 of 2 FIS 250 Week 1 DQs part 2 of 2 FIS 250 Week 2 Assignment: Risk Management Process FIS 250 Week 2 CheckPoint: Risk Management Objectives FIS 250 Week 3 CheckPoint: Underwriting, Claims, and Reinsurance FIS 250 Week 3 DQs part 1 of 2 FIS 250 Week 3 DQs part 2 of 2 FIS 250 Week 4 Assignment: Interpreting Insurance Contracts FIS 250 Week 4 CheckPoint: Determining Loss Outcomes FIS 250 Week 5 CheckPoint: Life Insurance Needs Analysis FIS 250 Week 5 DQs part 1 of 2 FIS 250 Week 5 DQs part 2 of 2 FIS 250 Week 6 Assignment: Group Medical Expense Plans FIS 250 Week 6 CheckPoint: Group and Group Life Insurance FIS 250 Week 7 CheckPoint: Loss Settlement Payments FIS 250 Week 7 DQs part 1 of 2 FIS 250 Week 7 DQs part 2 of 2 FIS 250 Week 8 Assignment: Losses Covered Under PAPs FIS 250 Week 8 CheckPoint: PAP FIS 250 Capstone Discussion Question FIS 250 Final Project: Playing the Professional FIS 250 COMPLETE CLASS To purchase this visit here: http://www.activitymode.com/product/fis-250-complete-class/ Contact us at: SUPPORT@ACTIVITYMODE.COM FIS 250 COMPLETE CLASS FIS 250 Week 1 CheckPoint: Risk Management Methods FIS 250 Week 1 DQs part 1 of 2 FIS 250 Week 1 DQs part 2 of 2 FIS 250 Week 2 Assignment: Risk Management Process FIS 250 Week 2 CheckPoint: Risk Management Objectives FIS 250 Week 3 CheckPoint: Underwriting, Claims, and Reinsurance ...

Words: 636 - Pages: 3

Premium Essay

Str 581 Week 6 Capstone Final Exam

...1. A(n) ________ market share of exactly 100 percent means that a company is tied for the market lead. A rise in relative market share means the company is gaining on its leading competitor. • potential • relative • served • overall 2. The typical risks of a cost leadership strategy include___________. • loss of customer loyalty • excessive differentiation to the point where the customer base is too small • the inability to balance high differentiation and low price • production and distribution processes becoming obsolete 3. The likelihood of entry of new competitors is affected by and ___________. • the power of existing suppliers; buyers • the profitability of the industry; the market share of its leading firm • barriers to entry; expected retaliation of current industry organizations • the demand for the product; the profitability of the competitors Complete STR 581 week 2 capstone final examination answers here STR 581 Week 2 Capstone Final Examination 4. In general, compared with firms which compete in only one market, among firms which face one another in multiple markets there is__________. • similar competitive rivalry • more competitive rivalry • less competitive rivalry • no competitive rivalry 5. The three parts of the external environment which affect a firm's strategic actions are__________. • economic, political, and legal • industry, business, and product • local, national, and global • general, industry, and competitor 6...

Words: 1674 - Pages: 7

Free Essay

Banking Crisis

...Research in Higher Education Journal Centering the business capstone course on the banking crisis: concrete integrated pedagogy Khalid A. Razaki Dominican University Wayne Koprowski Dominican University Peter Alonzi Dominican University Robert Irons Dominican University Abstract The recent financial crisis offers instructors rich material for business programs regarding the relations between accounting, business law, economics, and finance, as well as ethical issues. This paper offers a concrete approach to developing a business capstone course built around the financial crisis and the lessons it offers business students. Complete pedagogical modules are offered for each discipline, including suggestions for specific assignments in each discipline. Key Words: Capstone Course, Banking Crisis, Pedagogy Centering the Business Capstone Course, Pate 1 Research in Higher Education Journal INTRODUCTION A capstone course is essential in the business school curriculum. It provides each student the time to refresh their grasp of and to hone their ability to apply the principles, tools, and methods of the fields comprising the business curriculum. Further, it gives students the opportunity to integrate the insights of the various fields. The effectiveness of the capstone course can be enhanced by centering the capstone course on the 2008 financial crisis. All students share the common experience of the 2008 crisis’s violent shaking of the economy. It immediately affected each...

Words: 10514 - Pages: 43

Premium Essay

Capstone

...Capstone Project Cover Sheet Capstone Proposal Project Name: Upgrading from XP to Windows 7 is important for Security Student Name: Matthew Phelps Degree Program: Security Emphasis Mentor Name: Julianne Evans Table of Contents Capstone Proposal Summary 3 Review of Other Work 7 Project Rationale 10 Systems Analysis and Methodology 10 Goals and Objectives 14 Project Deliverables 21 Project Plan and Timelines 24 Project Development 25 Conclusion 29 References 31 Competency Matrix 32 Project Timeline 34 Additional Deliverables 35 Capstone Report Summary The entire world is becoming increasingly more reliant on data determined technology. Industries cannot ignore the inevitability of a reliable Information Technology network to be successful and to remain competitive with other corporations. Most companies obviously tend to ignore the necessity of maintaining efficient Operating Systems in their networks; the consequences can lead to amplified employee hindrance, diminished customer contentment and eventually reduced revenue. This capstone project emphasis is on a company facing those very problems. Providence Health Services is a large company that operates multiple hospitals across five states, with its headquarters located in Renton, Washington. The health system includes 27 hospitals, more than 35 non-acute facilities...

Words: 8794 - Pages: 36

Free Essay

Your Mom

...Program Guidebook Master of Science, Information Security and Assurance The Master of Science in Information Security and Assurance is a competency-based degree program that encompasses the main security domains of knowledge developed following strict guidelines for information security and assurance education prescribed by the National Security Agency. Understanding the Competency-Based Approach Practically speaking, what does it mean when we say that WGU’s programs are competency-based? Unlike traditional universities, WGU does not award degrees based on credit hours or on a certain set of required courses. Instead, you will earn your degree by demonstrating your skills, knowledge, and understanding of important concepts through a series of carefully designed courses. Progress through your degree program is governed not by classes but by satisfactory completion of the required courses that demonstrate your mastery of the competencies. Of course, you will need to engage in learning experiences as you brush up on competencies or develop knowledge and skills in areas in which you may be weak. For this learning and development, WGU has a rich array of learning resources in which you may engage under the direction of your student mentor. You will work closely with your mentor to schedule your program for completing the courses. You will also work closely with additional faculty members as you proceed through courses of study that are designed to lead you through...

Words: 4226 - Pages: 17

Premium Essay

Project Charter

...______________________________________________________________________________ Capstone Project III: Labs for High School NSA Capstone Project Charter ______________________________________________________________________________ Prepared By: Date of Publication: 03/29/2014 Revision History Version | Date | Author(s) | Revision Notes | 1.0 | 03/29/14 | Nicholas Jones/ Jorge Lopez/ Robert Howell | Original Document | | | | | | | | | | | | | | | | | Table of Contents Project Description 3 Project Objectives 3 Project Scope 4 In Scope: 4 Out of Scope: 4 Deliverables Produced: 4 Stakeholders: 5 Requirements: 5 Acceptance Criteria:Project Estimated Effort/Cost/Duration 5 Estimated Cost: 6 Estimated Effort Hours: 6 Estimated Duration: 6 Project Assumptions 7 Project Risks 7 Project Constraints 8 Project Dependencies 8 Project Approach 8 Project Organization 9 Communication Plan: 9 Project Guidelines: 9 Project Approvals 10 Project Description The Technical Director for a local school district wants three functional labs for various high school students to use. The labs will be essential for supporting the education of the students. Because there will be various students and instructors using the lab, it will require access to email via client and mobile devices, as well as secure authentications. A user guide Web page will be necessary. Project Objectives This project will...

Words: 1298 - Pages: 6

Free Essay

Minto Mine

...PROJECT MANAGEMENT REPORT ON MINTO MINE BY- DISHA GARDI (205) MBATECH-CHEMICAL INTRODUCTION The Minto Mine is located 240km north of Whitehorse, Canada. It is a high grade copper-gold mine that started its commercial production on October 1, 2007. It is owned 100% by Minto Explorations Ltd., a wholly owned subsidiary of Capstone Mining Corp. Capstone Mining Corp acquired Minto Explorations and all other project interests, including a partially constructed but dormant construction site, in June 2005. Within two years from acquisition, Capstone re-drilled the mineral resources to mineral reserve standards, completed a bankable feasibility study, arranged project financing, built a new mine and reached commercial production. In the two years following that the mine has undergone a tremendous change ; it has been expanded twice , there is an increase in throughput by more than 100 % and also discovered five new deposits. The Mine is basically an open pit mining operation with conventional crushing, grinding, and flotation to produce copper concentrates with significant gold and silver credits. In December 2007, pre-feasibility study for the expansion of the copper-gold mine was done. The study benefited because it laid out a path for significant increase in copper production and also increased mineral reserves, enhancing project economics.  The basic steps done in mining while handling the project are: Mineral Exploration The first role of engineering in mines...

Words: 1108 - Pages: 5

Premium Essay

Acc499 Capstone

...Capstone Research Project Cassandra Quinn ACC499 – Accounting Undergraduate Capstone June 16, 2013 Professor Wendy Achilles Capstone Research Project Auditing is the cornerstone of financial reporting because it provides attestations to the fairness and accuracy of a company’s financial records. Accountants and Auditors prepare and assess financial records to declare the fairness and accuracy of a company’s financial records. Auditors perform what is known as an audit which is a close inspection of a company’s financial records to ensure they are correct; during a financial audit all financial records of a company including ledgers, internal financial reports, official published reports, accounts payable, and accounts receivable will be examined. This type of inspection keeps a company honest and also reassures investors as to the financial status of the organization. Accountants must follow a common set of accounting principles, standards and procedures that companies use to compile their financial statements known as Generally Accepted Accounting Principles (GAAP) are a combination of authoritative standards and simply the commonly accepted ways of recording and reporting accounting information. GAAP rules attempt to cover such a broad field that it is filled with loopholes and allow for multiple ways of presenting the same data; these loopholes can be used by management to manipulate the earnings of an entity. During an audit the auditor may encounter “red flags”...

Words: 2683 - Pages: 11

Premium Essay

Vulnerability Management Plan

...resubmission. Submit to: Western Governors University Attn.: Assessment Delivery Department 4001 South 700 East, Suite 700 Salt Lake City, Utah 84107-2533 wgusubmittals@wgu.edu Capstone Project Cover Sheet Capstone Project Title: Vulnerability Management Plan Student Name: Mike Douglas Degree Program: Bachelor of Science Information Technology Security Mentor Name: Martin Palma Signature Block Student’s Signature Mentor’s Signature Table of Contents Capstone Report Summary (Introduction) 1 Review of Other Work 3 Rationale and Systems Analysis 8 Goals and Objectives 13 Project Timeline 22 Project Development 24 References 28 Appendix 1: Competency Matrix 29 Appendix 2: CVSS GUIDE 32 Appendix 3: DICES IV vulnerability management plan 33 Capstone Report Summary (Introduction) Digital Integrated Communications Electronic System version IV (DICES IV) is a critical piece of communications infrastructure relied on to ensure missile launch success. When a single mission’s price tag soars into the tens and sometimes hundreds of millions of dollars, management of hardware, software, and personnel risks and vulnerabilities must be included to mitigate events that...

Words: 6924 - Pages: 28

Premium Essay

Test

...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...

Words: 18577 - Pages: 75

Premium Essay

Student Handbook

...Berkeley Master of Engineering Program Student Handbook 2014-2015 edited 6/17/14 ld 1 Table of Contents MASTER OF ENGINEERING PROGRAM CONTACT INFORMATION ........................................................ 4   FUNG INSTITUTE FACULTY & STAFF .......................................................................................................................... 4   DEPARTMENT STAFF .................................................................................................................................................. 5   ADDITIONAL RESOURCES CONTACT INFORMATION ................................................................................ 6   MASTER OF ENGINEERING HONOR CODE ..................................................................................................... 7   ACADEMIC INTEGRITY................................................................................................................................................ 7   ACADEMIC AFFAIRS ............................................................................................................................................. 10   THE ACADEMIC PROGRAM ....................................................................................................................................... 10   ADVANCEMENT TO CANDIDACY .............................................................................................................................. 10   REGISTRATION...

Words: 9633 - Pages: 39

Premium Essay

Drew

...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail...

Words: 7871 - Pages: 32

Premium Essay

Capstone Project

...Authorization Professional Capstone ------------------------------------------------- Security Authorization Project Scenario: You are a newly employed Security Analyst (consultant) at ACE Technologies, LLC. ACE just won an Information Security contract with a U.S. Federal Agency (Center for Health Management - CHM). The contract requires ACE to deliver several Security Operations and Management Services, security assessments being one of them. As the new ACE consultant you have been assigned to assess one of CHM’s Information Systems (IS) in the Health Evaluation Dept, which consists of five thousand (5000) Windows 2008 and Windows 2012 servers that are similarly configured and built of the same hardware (Dell Blade Servers). This IS primarily stores files and processes privacy (PII) data in the form of employee and customer health records, and credit card, as well as procurement information that includes contracts and financial data. Task: Using the NIST 800-37 Rev1 RMF assess the IS and determine the system classification/category, impact level, existing and applicable controls, and recommendations to enhance the security posture. You will develop a Security Authorization Package consisting of the required documents below and one (1) additional document from the list of optional documents. Use all tools and methods available to you to obtain information and assess the Information System. Required Documents: (MUST BE CREATED) * System Security Plan (SSP) * Security...

Words: 354 - Pages: 2

Premium Essay

Gfghfghfghfghf

...Values and Generic Strategy MGMT90146 Strategic Management Week2 Tom Osegowitsch and Dean Xu 1 Today’s Agenda  House-keeping Vision, Mission & Values; Generic Strategy Yellow Tail Case Capstone: more tips, team formation. 2    Reference Textbooks     Grant, R.M. “Contemporary Strategy Analysis” (recent editions) Blackwell Publishing Dess, G.G., Lumpkin, G.T., & Eisner A.B. “Strategic Management” (recent editions), McGraw-Hill Barney, J.B. & Hesterly, W.S. “Strategic Management and Competitive Advantage” (recent editions) Pearson. Hill, C.L.W., Jones, G.R., Galvin, P., & Haidar, A. “Strategic Management: An Integrated Approach” (recent editions) John Wiley & Sons Australia All available in library. 3 RECALL: Elements of Strategic Management Process Strategic Analysis Strategy Formulation Implementation 4 Strategic Analysis Vision, Mission, Values External Analysis Internal Analysis Vision, mission, values; External Analysis; and Internal Analysis are inputs for Strategy Formulation. 5 VISION, MISSION & VALUES Definitions Three interrelated concepts Terms used rather indiscriminately, sometimes synonymously (also: charter, ideology, creed or credo, ethos…) 6 Definitions (cont’d) Collins & Porras 1996 vs. Mission & Values Vision …as defined in this subject 7 Top Management’s Evolving Role Traditional View Defining a clear strategic plan Emerging View Articulating mission and values...

Words: 2203 - Pages: 9