Premium Essay

Managing Risk Lab 9

In:

Submitted By Macross
Words 711
Pages 3
Managing Risk in Information Systems
Lab 9 Assessment Questions

1. How does documented back-up and recovery procedures help achieve RTO? a. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO.

2. True or False. To achieve an RTO of 0, you need 100% redundant, hot-stand-by infrastructure (i.e., IT system, application, and data, etc.). b. True

3. What is most important when considering data back-up? c. Registry, directories, and imperative operating data as well as licensing.

4. What is most important when considering data recovery? d. Most current, working recovery and in a timely manner (fast).

5. What are the risks of using your external e-mail box as a back-up and data storage solution? e. First, you are at the mercy of the provider. If it is a large recovery you may not be able to have internet access to download it. File corruption could be an issue as well as back up size allowable for email.

6. Identify the Total Amount of Time Required to Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your computer clock – following your documented instructions and steps}. f. N/A. Was not asked to do this portion of the lab and cannot finish this question.

7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower? g. I am assuming from the lab, steps that would be with better equipment, a Hot-Site and lots of money.

8. What are some

Similar Documents

Premium Essay

Managing Risk Lab #9

...and data, etc.).       b. True   3. What is most important when considering data back-up?       c. Registry, directories, and imperative operating data as well as licensing.   4. What is most important when considering data recovery?       d. Most current, working recovery and in a timely manner (fast).   5. What are the risks of using your external e-mail box as a back-up and data storage solution?       e. First, you are at the mercy of the provider. If it is a large recovery you may not be able to have internet access to download it. File corruption could be an issue as well as back up size allowable for email.   6. Identify the Total Amount of Time Required to Recover and Install the Lab #9 Assessment Worksheets on Your Student VM Hard Drive and open the file in Microsoft Word to verify integrity. {Insert your timed RTO using your computer clock – following your documented instructions and steps}.       f. N/A. Was not asked to do this portion of the lab and cannot finish this question.   7. Did you achieve your RTO? What steps and procedures can you implement to help drive RTO even lower?       g. I am assuming from the lab, steps that would be with better equipment, a Hot-Site and lots of money.   8. What are some recommendations for lowering the RTO for retrieval and access to the back-up data...

Words: 323 - Pages: 2

Premium Essay

Lab 2

...Lab #2 – Student Steps: Student steps needed to perform Lab #2 – Align Risk, Threats, & Vulnerabilities to the COBIT Risk Management Controls: 1. Connect your removable hard drive or USB hard drive to a classroom workstation. 2. Boot up your classroom workstation and DHCP for an IP host address. Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -11- Student Lab Manual 3. Login to your classroom workstation and enable Microsoft Word. 4. Conduct a high-level narrative discussion and review of the COBIT v4.1 Framework. 5. Review the COBIT P09 Control Objective definition, scope, and focus areas for assessing and managing IT risk. 6. Relate how the COBIT (P09) Control Objective definition relates to assessing and managing IT risk within each of the seven domains of a typical IT infrastructure: User, Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains 7. Explore the structure and format of how to align risks, threats, and vulnerabilities identified from your IT infrastructure to the COBIT P09 Control Objective definition, scope, and focus areas Information, Applications, Infrastructure, and People. 8. Explore the hierarchy for assessing and managing IT risks: • Step #1: Align the risk, threat or vulnerability assessment to C-I-A primary first and assess • Step #2: Align the risk, threat, or vulnerability remediation to Effectiveness, Efficiency...

Words: 381 - Pages: 2

Premium Essay

Computer Lab Plan

...| Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | | Computer Lab PlanAssignment One | Hersh Gulati | 5/27/13 | Project Management | | Executive Summary Auckland University of Technology (AUT) is ranked in the top 500 universities of the world. The university has experienced a significant increase in the number of students enrolling in its Business and Law faculty over the years. Its Business and Management Studies was ranked as one of the top 200 in the world. As a result, there has been an increasing requirement for using computer systems in all its faculties, including the non-technological subject areas. Due to the growth envisioned over the next five years, AUT has decided that it requires two new computer labs to accommodate its Business and Law faculty students.To meet this requirement, level 7 of WF building will be refurbished to accommodate the new computer labs, instead of the exisiting seven classrooms. The renovation will be carried out as a 6 months long project commencing on 30th June 2015. Taking the Christmas and New Year’s holiday period into account, the project will be completed by 22nd December 2015, before the beginning of Term 1, 2016. The calculated budget for the project is $1.294 million, which includes 10% of contingency amount. The key deliverables for the project are: * Lab designs and architectural layouts for the computer labs * Two new computer labs The major tasks that will...

Words: 4005 - Pages: 17

Premium Essay

Relocation Project Fro Lab Equipment

...Relocation Project Project Management Plan (PMP) For ABC QC Lab Equipment Relocation * * May 4, 2010 Prepared by Ingrid Valmes Table of Contents 1. Introduction 1 1.1 Project Summary 1 1.1.1 Scope 1 1.1.2 Funding Source 1 1.1.3 Objectives 1 1.1.4 Products Produced by the Project 1 1.2 Document Summary 1 1.2.1 Purpose 2 1.2.2 Evolution of the Plan 2 2. Roles and Responsibilities 3 2.1 External Roles and Responsibilities 4 2.1.1 Project Sponsor 4 2.1.2 Resource Manager 4 2.1.3 Contracts Representative 4 2.2 Project Roles and Responsibilities 4 2.2.1 Senior Manager 4 2.2.2 Project Manager 4 2.2.3 Requirements Manager (Project Team Member) 4 2.2.4 Measurement Analyst (Project Team Member) 4 2.2.5 Quality Assurance Manager (Project Team Member) 4 2.2.6 Configuration Manager (Project Team Member) 4 2.2.7 Risk Manager (Project Team Member) 4 2.2.8 Team Leaders (Project Team Member) 4 2.2.9 Project Training Needs 4 3. Project Management Activities 4 3.1 Integrated Project Management 4 3.1.1 Use of DHI’s Defined Processes 4 3.1.2 Coordinate and Collaborate with Relevant Stakeholders 4 3.2 Project Planning 4 3.2.1 Establish Estimates 4 3.2.1.1 Material Costs 4 3.2.2 Develop a Plan 4 3.2.3 Obtain Commitment to the Plan 4 3.2.4 Communicate the Plan 4 3.2.5 Risk Management Planning 4 3.2.6 Quality Assurance Planning 4 3.2.7 Quality Assurance Audit Schedule 4 3.2.8 Project Management Tools 4 3.3 Project Monitoring and Control 4 ...

Words: 4534 - Pages: 19

Premium Essay

Pmp Library

...3 Managing Projects within Organizations.............................3 Project Management .............................................................. Process Groups.....................................................................3 Execution, Monitoring and Controlling...............................3 Project Change Control and Closure...................................4 Initiation Basics, Developing a Project Charter and Project Management Plan...................4 Collecting Requirements and Defining Scope......................4 Monitor and Control Project Scope......................................4 Defining and Sequencing Project Activities..........................5 Developing and Controlling the Project Schedule...............5 Estimating Activity Resources and Durations......................5 Controlling Costs..................................................................5 Estimating & Budgeting Project Costs.................................6 Project Quality Planning......................................................6 Quality Assurance and Cost Control....................................6 Managing Projects for Human Resources............................6 Planning Projects for Human Resources..............................7 Processes for Managing Project Communications...............7 Stakeholders and the Communication Management Plan....7 Identifying Project Risks.......................................................7 Performing Risk...

Words: 10262 - Pages: 42

Premium Essay

Test

...(30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110  NT1210 Structure and Introduction to  ComputerLogic Networking    IS3120 IS3110 NT1210 Network  Risk Management in Introduction...

Words: 2305 - Pages: 10

Free Essay

Uh Ya Boy Is Cool

...Analysis of Business Issues, Writing In the Disciplines (WID) BADM 2003W (93752): BADM_2003W.SEC.11 Monday Combined Class: SEMESTER: Spring 2014 LOCATION & TIME: Funger 209, Monday 2:20 PM-3:35 PM PROFESSOR: Dr. Bret Crane Department of Management Office: Funger Suite 315N Email: bretdcrane@gwu.edu Office Hours: Tuesdays 1:00-2 PM or by appointment TEACHING ASSISTANTS & WRITING LABS: | | | |Section # |Begin |End |Day |TA |Email | |30 |08:00 AM |09:15 AM |Wed |Mark De Cicco |mdecicco@gwmail.gwu.edu | |31 |09:25 AM |10:40 AM |Wed |Mark De Cicco |mdecicco@gwmail.gwu.edu | |32 |10:50 AM |12:05 PM |Wed |Tess Strumwasser |tstrumwa@gwu.edu | |33 |12:15 PM |01:30 PM |Wed |Tess Strumwasser |tstrumwa@gwu.edu | |34 |01:40 PM |02:55 PM |Wed |Daniel Berkhout |berkhout@gwmail.gwu.edu | |35 |03:05 PM |04:20 PM |Wed |Daniel Berkhout |berkhout@gwmail.gwu.edu | |36 |04:30...

Words: 4144 - Pages: 17

Free Essay

Syllabus

...Analysis of Business Issues, Writing In the Disciplines (WID) BADM 2003W (95440): BADM_2003W.SEC.12 Tuesday Combined Class: SEMESTER: Spring 2014 LOCATION & TIME: Duques 353, Tuesday 11:10 AM-12:25 PM PROFESSOR: Dr. Bret Crane Department of Management Office: Funger Suite 315N Email: bretdcrane@gwu.edu Office Hours: Tuesdays 1:00-2 PM or by appointment TEACHING ASSISTANTS: |Erin Vander Wall | | |Leigha McReynolds | | |Mark De Cicco | | |Tess Strumwasser | | |Daniel Berkhout  | | |Sam Yates | | |Vicki Brown | | | ...

Words: 4096 - Pages: 17

Free Essay

Abcd

...Shanti Business School PGDM Batch 2015-17 Semester II Course Outline 1 Shanti Business School, Ahmedabad PGDM 2015-17: Program Structure Semester-1 Semester-2 Semester-3 Semester-4 Course credit Course credit Course credit Language Skills @ Written Analysis & Communication @ Soft skills II @ Employability Skills @ IT & MIS 2 Soft skills I @ Computing skills 2 Social Media Marketing @ 2 Legal Aspects of Business 2 Business Strategy 3 Management Control Systems 3 Micro Economics 3 Macro Economics 3 Business Environment 3 Business Ethics & Corporate Governance 2 Quantitative Methods-1 3 Business Research Methods 3 Quantitative Methods-2 3 Core Elective-1 3 Core Elective1 3 Core Elective-2 3 Core Elective2 3 Elective-1 3 Elective-1 3 Elective-2 3 Elective-2 3 Grand Project-1 3 Grand Project-2 3 Principles of Management Basic Building Blocks Autumn Break Executive Skills Organisational Behavior Human Resources Management 3 Marketing Management 1 3 Marketing Management -2 3 Understanding Financial Statements 3 Financial Mgt 3 Operation Management Management Domain 3 3 Basics of Business Planning 2 Electives Credits Autumn Break credit SUMMER INTERNSHIP Course ...

Words: 7010 - Pages: 29

Premium Essay

Strory

...timetable will be issue to you at a later stage. COMPULSORY - 80 Credit Units Code ACC201e Name Financial Accounting Credit Jul Units 12 5 Y Jan 13 Y Jul 13 Y Jan 14 Y Last Presentation Time Table 2018/07 FRIDAY WEEK 1 TERM 1 FRIDAY WEEK 1 TERM 2 THURSDAY WEEK 2 TERM 1 MONDAY WEEK 2 TERM 1 MONDAY WEEK 2 TERM 2 TUESDAY WEEK 1 TERM 1 Pre-requisite Excluded Combination BFSZ231 or BFSZ333 or CUL207 BFSZ231 or BFSZ333 BSZ220 BSZ150 BSZ150 BUS101e & BUS103, HRM201 Grouping Remarks . Lab* NONLAB NONLAB NONLAB NONLAB NONLAB NONLAB ACC203e BUS105e BUS201 BUS203 BUS206 Managerial Accounting Statistics Contract and Agency Law Company Law and Corporate Governance Managing People 5 5 5 5 5 Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y Y 2018/07 2016/01 2016/01 2016/01 2020/01 Page 1 of 9 Code BUS488 Name Strategy Credit Jul Units 12 10 Y Jan 13 Y Jul 13 Y Jan 14 Y Last Presentation Time Table 2016/07 SATURDAY - Pre-requisite Excluded Combination BUS499 Grouping Remarks Lab* To take in final NONsemester of LAB programme of study. Compulsory Attendance is required for all seminar sessions. Penalty will be applied for absence from seminar without School of Business approval. NONLAB NONLAB NONLAB ECO201e ECO203e FIN201 FIN305e FIN307e FIN309 FIN365 MKT202 Managerial Economics International Economics Financial Mathematics Financial Markets and Instruments Financial Institutions...

Words: 2306 - Pages: 10

Premium Essay

Oxford Plastics Company

...De La Salle University Ramon V. del Rosario College of Business Management and Organization Department Case Analysis No. 5 Oxford Plastics Company Management Principles and Dynamics Mr. Raymund Habaradas 3st Term, S.Y. 2011-2012 Group 2 Balinas, Diberjohn Carigara, Llany Lopez, Annie Santiago, Kristoffer Villapando, Leizl 12 March 2012 Case Analysis No. 5: Oxford Plastic Company. -The Power of Two. 1 Table of Contents Page No. I. II. III. Synthesis Point of view Statement of the problem 3 3 3 3 3 6 7 9 11 11 IV. Statement of objectives V. Areas for Considerations VI. Alternative courses of action VII. Recommendation VIII. Implementation plan IX. Learning points X. Reference Case Analysis No. 5: Oxford Plastic Company. -The Power of Two. 2 I. Synthesis Oxford Plastics is a manufacturer of high quality plastics and resins. The plant employs 3000 workers in a 75-acre facility in Beatty town. It has plans of expanding the facility to accommodate a color laboratory and paint shop that will enable better and faster operations to meet customer requirements and increase competitiveness. The Governor is in full support of the additional facility for economic development. He encouraged the plant manager to coordinate with officials to address and avoid problems in relation the expansion. Oxford Plastics is faced with a challenge of positioning the additional 25-acre facility considering industrial zoning boundaries and the need to comply with...

Words: 2645 - Pages: 11

Free Essay

Spring Scheduel

...Spring 2015 School of Business - Graduate Course Schedule Tentative January 15, 2015 – May 5, 2015 CRN | Course | Sec. | Title | Cr | Instructor | Day | Time | Room | Location | 20911 | BUS500 | 191 | Business Law, Ethics, and Social Responsibility | 3 | McKenna | Thursday | 6:00-8:50 pm | SL 411 | Worcester | 20912 | BUS500 | 1960 | Business Law, Ethics, and Social Responsibility | 3 | McKenna | Saturday* | 1:00-4:30 pm | | Blended | 20913 | BUS517 | 1960 | Graduate Qualifying Project in Management | 3 | Wulf | Saturday* | 8:30–Noon | | Blended | 20914 | BUS522 | 191 | Global Business Experience: China | 3 | Zeng | Saturday^ | 8:30am -4:30 pm | TBD | Blended | 21318 | BUS598 | 1960 | Globalization, Social Responsibility and Org. Strategy | 3 | Sweeney | Saturday* | 1:00-4:30 pm | | Blended | 21320 | BUS598 | 1960 | Introduction to Health Systems | 3 | Johnson | Saturday* | 1:00-4:30 pm | | Blended | 22067 | BUS598 | 191 | Introduction to Sustainability Management | 3 | O’Brien | Thursday | 6:00-8:50 pm | FL 311 | Worcester | 20915 | ETR596 | 191 | Selling and Sales | 3 | Delvy | Tuesday | 6:00-8:50 pm | SL 406 | Worcester | 20916 | FIN501 | 191 | Economics for Managers | 3 | Wang | Tuesday | 6:00-8:50 pm | WB 323 | Worcester | 20917 | FIN501 | 1960 | Economics for Managers | 3 | Wang | Saturday* | 8:30-Noon | | Blended | 21761 | MIS571 | 191 | Database Applications Development | 3 | Strong | Tuesday | 6:00-8:50 pm | WB 229 | Worcester | 20918...

Words: 655 - Pages: 3

Premium Essay

Project Management

...Lahore University of Management Sciences DISC-331 – Project Management Fall 2013 Instructor Room No. Office Hours Email Telephone Secretary/TA TA Office Hours Course URL (if any) Zehra Waheed 214 SDSB Building By appointment zehra.waheed@lums.edu.pk 8426 Course Basics Credit Hours Lecture(s) Recitation/Lab (per week) Tutorial (per week) Course Distribution Core Elective Open for Student Category Close for Student Category 3 Nbr of Lec(s) Per Week Nbr of Lec(s) Per Week Nbr of Lec(s) Per Week 2 3 lab sessions as per schedule N/A Duration Duration Duration 75 minutes N/A N/A Yes Sophomores, juniors, seniors None COURSE DESCRIPTION Project management is increasingly used both in public sector and the private sector organizations worldwide. They are undertaken in a variety of industries, some of which, for example, software development and construction, relying almost entirely on projects. Examples of projects include the installation of new IT systems, introducing new internal processes or procedures, managing organizational wider change or innovation, orchestrating office moves, opening new branches, disaster management, launching a new product or service, launching of an advertising campaign, or bidding for a major customer contract. Consultancy sometimes also takes the project form. Given the nature of the corporate world these days, students undertaking this course can be expected to be involved in projects during some part of their careers. The course...

Words: 1504 - Pages: 7

Premium Essay

Merck & Company -Evaluating a Drug Licensing Opportunity .Doc

...INTRODUCTION Merck & Company : Evaluating the Licensing Opportunity Various recently-born biotech companies sell their technologies in either finished or early stage to bigger companies in need of financing capital to preceed business, while those bigger companies acquire technologies to scout for promising profitable business. This sort of process needs numbers of decision makings and agreements from both parties on the valuation methods is crucial here. The valuation method being used has to hold objective validity and generality. For the managers to make accurate forecast of future profitability in managing companies, quantified decision making process is needed. Here we are dealing about whether Merck should give financial support to the R&D project of Davanrik offered by LAB, and about the process of valuation and the final decision. First we are to make brief of LAB’s business proposal and practice detailed valuation functions to decide if the proposal is profitable or not. And finally we will make a decision based on the valuation process in perspective of Rich Kender, Vice President of Financial Evaluation & Analysis of Merck. Brief introduction of Merck and its agenda regarding Davanrik project As a world-class pharmaceutical company concentrated on R&Ds, Merck is performing various researches and developments upon medical supplies for human and animals. Merck is providing Pharmaceutical Benefit Management (i.e. PBM) through a company called Merck-Medco...

Words: 1134 - Pages: 5

Premium Essay

It255

... Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications...

Words: 4114 - Pages: 17