StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

IT Infrastructure Business Recovery Planning for Critical Information System - Coursework Example

Cite this document
Summary
"IT Infrastructure Business Recovery Planning for Critical Information System" research undertook the critical review of literature and primary research since the ethos of understanding the theory via actual experience is a sure way in understanding the queries of the research…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
IT Infrastructure Business Recovery Planning for Critical Information System
Read Text Preview

Extract of sample "IT Infrastructure Business Recovery Planning for Critical Information System"

Download file to see previous pages

In the research that has been done, it has been found out that the concern pertinent to information security is brought about by conflating factors that have come together and created this scenario or condition which necessitate management of information system. What does this mean?First, the concept and valuation o of information in the contemporary business world has changed (Calder & Watkins, 2008; Kerke, et al, 1995; Chandra, 2008; Sipior & Ward, 2008). Information in the contemporary period has been deemed as a valuable asset for the company that has to be protected since it can enhance price premiums (Calder & Watkins, 2008).

At the same time, intellectual capital is becoming increasingly important for the shareholder and the company (Calder & Watkins, 2008). Being such, possession of information enhances the productivity of the members of an organization particularly and of the organization as a whole (Chandra, 2005).Second, the changing nature of contemporary business contributes to the further need for information security (Toncati & Zolsnia, 2009; Zolsnia, 2006; Kerke et al, 1995; Axelrod, 2004). This holds true especially for businesses that utilize personal information of individual customers which may be used for their benefit but if it falls in the wrongs hands, it can be used against them.

This is very significant since transactions among and between businesses and in dealing with customers, virtual reality is now one of the modes with which the transaction is being undertaken (Axelro, 2004; Calder & Watkins, 2008). In the virtual reality, there is no more personal contact between the involved parties but only exchanges of vital information that is needed for the business transactions. In this regard, the need for the security of the information exchange becomes mandatory. Third, another conceptual underpinning that is seen in the research is the significant role and impact of globalization in information technology.

Due to globalization, businesses establish companies outside their mother country (Mundal & Gupta, 2008).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(IT Infrastructure Business Recovery Planning for Critical Information Coursework, n.d.)
IT Infrastructure Business Recovery Planning for Critical Information Coursework. https://studentshare.org/information-technology/1738295-it-infrastructure-business-recovery-planning-for-critical-information-system
(IT Infrastructure Business Recovery Planning for Critical Information Coursework)
IT Infrastructure Business Recovery Planning for Critical Information Coursework. https://studentshare.org/information-technology/1738295-it-infrastructure-business-recovery-planning-for-critical-information-system.
“IT Infrastructure Business Recovery Planning for Critical Information Coursework”. https://studentshare.org/information-technology/1738295-it-infrastructure-business-recovery-planning-for-critical-information-system.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Infrastructure Business Recovery Planning for Critical Information System

Information warfare and cyber security

Background information on information warfare 3 1.... How and why cyber-attacks take place 12 3Methods of information warfare 17 4Who are affected in information warfare /cyber terrorism?... Table of Contents Abstract 2 1Introduction 3 1....
40 Pages (10000 words) Research Paper

Restoration and Recovery of Information Systems and Data

nbsp;… Restoration and recovery of information system operations have become one of the most important concerns in information systems management.... PDD 63 or the Critical Infrastructure Protection directive and FPC 65 summarize the requirements for COOP information system infrastructure and emergency measures.... estoration of information system Operations According to the National Security Agency (NSA), through the Information Assurance Directorate (IAD), information assurance refers to procedures designed to safeguard and secure information and information systems against failure, collapse or attacks....
6 Pages (1500 words) Case Study

Disaster Recovery Planning for NIST

This article looks at the various essential elements of disaster recovery planning how NIST guidelines can be applied to implement a disaster recovery plan.... Malfunctioning of Individual units in a system, Network Cables, Cable tapping are some of the physical factors that pose risk to a Business (Cooper, 1995).... alfunctioning of Cables and Other Components: Another major risk faced by the business is due to the improper functioning of components present in a system or the Network cables that make up the backbone of any network....
8 Pages (2000 words) Essay

Disaster Recovery Plan

roubleshooting Plan' hardly needs any over emphasis; particularly, when confronted with serious I T system problems which have the potential of bringing the entire operations to a grinding halt – a virtual disaster, which any organization can ill afford.... “information as Power” in the 21st century has been well recognized by the Adelphi University (AU) - a private university located in the state of New Jersey, USA.... AU has therefore chosen to establish state of art Telecommunication and information Systems for its… Sophisticated systems carry with them, the inherent risks of malfunction or serious damage, either by chance or by intent, at times by known sources and more often from unknown sources....
19 Pages (4750 words) Term Paper

Disaster Recovery Planning

The paper "Disaster recovery planning" describes that for the company's general services and infrastructure, the officers will be required to make sure that the information is backed up regularly.... hellip; The company will protect the current system by controlling access, having uninterrupted power supply and back-up generators with diesel fuel contracts and fuel suppliers that have a backup in case there is a power outage.... his planning offers a framework of interim mechanism to recover the services of IT after the system has been disrupted....
5 Pages (1250 words) Essay

Important and Critical Data of Business

The risk assessment determines the likelihood and scale of potential disasters, which aids in planning for deciding technologies to implement and how much to budget.... The paper 'Important and Critical Data of Business' focuses on information which is the lifeblood of today's business organizations, and loss of data means loss of business services and loss of revenue.... Establishing suitable information service level agreements from service providers, security policies and procedures are essential for any DRP....
9 Pages (2250 words) Term Paper

Critical Infrastructure Recovery Planning

Schmidt (2010) explains 'the emergency response policies and guidelines should implement and maintain an emergency communication system that can help identify the nature of an emergency and provide instructions when needed'.... Erbschloe (2003) says that 'the enhancement of capabilities of concerned organizations to prevent, protect against, respond to, recover from, create resources and mitigate the effects of natural disasters, acts of terrorism, and other man-made disasters'Disaster recovery as stated by Phillips (2009) 'is the process, policies, and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster'....
10 Pages (2500 words) Assignment

Disaster Recovery Plan

For example, if one is responsible for computer systems that provide the business with critical data to both clients and internal company officials.... Mitigation employs different strategies, such as technological solutions (like flood levees), while other measures may include legislation, insurance, and land-use planning (Allred, Addams, and Chakraborty, 2007).... This report "Disaster recovery Plan" presents disaster lifecycle as the steps through that emergency is managed....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us