Cyber

  

 Describe tailoring technology appropriate for software as a service (SaaS) in the cloud model. Include deployment strategy after tailoring of data protections for SaaS cloud infrastructure. Cover where in technology of the cloud would employ use of techniques. Also identify which components would use which techniques.]

Problem Based Learning

 

The Context of the Problem

Large technology projects, whether the development of new technologies or upgrading current systems or software applications, can be costly. In larger organizations, a million-dollar (or more) project is not unusual. Once a project is rolled out to production, it is important to evaluate the performance of the project. This is generally a comparison of the anticipated benefits used in making the decision to move forward with the project versus the actual performance of the systems of software once in use. Various methods may be used to evaluate the performance; however, it is important to develop a broad set of standards for making an assessment of the systems or software.

The Problem

Your organization has made a very large investment in the purchase of infrastructure or development of an in-house software application. As examples, the network infrastructure has had a hardware refresh, business analysis data tools have been implemented, or a new customer resource management software tool has been implemented. Your team must assess the performance of the newly launched technology. You will be providing the various stakeholders (user community, project managers, and senior leadership) with the plan to be used for conducting the performance assessment, including the process of collecting performance data, analysis methods, and an explanation of the appropriateness of the methods to be used (the data may be concocted or gathered from a representative system).

As you work through the problem, be sure to focus on reaching these learning outcomes:

  1. Optimize organizational processes using data analysis.
  2. Assess the potential of various software to enhance organizational performance.
  3. Evaluate applications for the potential to improve collaboration, sharing, and lowering cost.
  4. Manage application development to lower cost and improve quality and customer satisfaction.
  5. Maximize the return on organizational technology investments.
  6. Develop application policies and procedures consistent with the Virtuous Business Model.
  7. Assess the challenges, technologies, and system approach issues in developing and deploying applications.

 

Instructions for Deliverable

 

Plan of Action

 Generate a Plan of Action for the team members to follow.

  1. Conduct a team member self-assessment of background experience and skills for the identified measures that will need to be observed.
  2. As a team, review each member’s responses to the self-assessment and determine best fits. If a lack of comprehension in a specific measure is identified, come to a consensus on the best team member to research the measurement attributes.
  3. Develop a team strategy for assigning measurement tasks.
  4. Make sure there is a team lead and that each team member understands their role in the project.

Business Continuity Plan for a Financial Institution

  

PROJECT TITLE

Business Continuity Plan for Financial Institutions

ABSTRACT

Due to increase in customers’ demand, competition, 24hrs continuous service, frequent changes in regulatory policy requirements and changes in various threats landscape have put some pressures on financial institution to bring up a robust and comprehensive contingency plans that assured the continuity of their services.

This paper outlines the relevance of business continuity plan to financial institutions. This project will highlight the stakeholder’s involvement in the development of the plan, the understanding of the plan and how often the plan will be tested.

INTRODUCTION

Financial organizations could confront the disruption of major services due to attacks such as natural disasters like floods, earthquake, or fire. Disruption of services could come because of hacktivist attacks, servers, and networks problems. Because all these reasons, financial institutions need to develop a comprehensive business continuity plans that guarantees quick recovery of business after a disaster.

A single occurrence of a disaster can results in greater financial losses, erode investors and customers confidence and damaging of corporate image. Such an act can also lead to serious legal issues and litigations.

A well designed, implemented and tested contingency plan is the best assurance to protect against financial losses to any organization (Moore, 1995). There is a need for financial organizations to have an effective Business Continuity Plan (BCP) that ensure quick business resumption and limit losses in the event of services disruptions.

STATEMENT OF THE PROBLEMS

Financial institutions are susceptible to different types of services disruptions stated in the introduction above, which could adversely impact the organization. In today’s world, Business Continuity Management (BCM) is becoming increasingly important. This research work will highlight the relevance of Business Continuity Planning to financial institutions and analyses the disaster preparedness of financial institutions to major disasters and disruptions by examining the Business Continuity Management policies, standards, and practices. It will go further to test the awareness and readiness of the stakeholders.

Objective of the study

This research work will highlight the importance of Business Continuity Planning to Financial Institutions.

Scope of the study

This study will be limited to BCP development for financial institutions only. It will cover the following key areas

· Business Continuity Plan Process

o Identification of key business areas.

o Identification of critical functions.

o Identify dependencies between various business areas and functions.

o Determine acceptable downtime for each critical function.

o Create a plan to maintain operations.

· Components of Business Continuity Plan:

o Business Impact Analysis

o Disaster Recovery Plan

o Disaster Recovery Plan and Tabletop test.

· Challenges with implementing Business Continuity Plan

· Summary

Disaster Recovery Planning

1. Your organization is implementing a new file server. You have been asked to implement a disk subsystem that is a failure-resistant disk system (FRDS). Which criterion should this system meet?

A. It protects against data loss due to disk drive failure.

B. It protects against data loss due to external power failure.

C. It protects against loss of access to data due to power supply failure.

2.What is the term for RAID 1 implemented with a single hard disk controller?

A. Disk duplexing

B. Disk mirroring

C. Disk striping

3. Your company has a backup solution that performs a full backup each Saturday evening and an incremental backup all other evenings. A vital system crashes on Monday morning. How many backups will need to be restored? 

A. One

B. Two

C. Three 

4. Your organization implements a full/differential backup scheme. A full backup was completed two days ago. Yesterday, a differential backup was completed. Which files were backed up yesterday? 

A. All files in a backup set

B. All files in a backup set that were changed or created since the last full backup

C. All files in a backup set that were changed or created since the last differential backup 

5. Which electronic backup solution backs up data in real time but transmits the data to an offsite facility in batches?

A. Remote journaling

B. Hierarchical storage management (HSM)

C. Electronic vaulting

6. Your organization is researching alternate computing facilities to ensure that the organization is able to function if the primary facility is destroyed. Which offsite facility is the most expensive to implement?

A. Hot site

B. Warm site

C. Cold site

7. During a recent natural disaster, the primary location for your organization was destroyed. To bring the alternate site online, you restored the most critical systems first. Now a new primary site is complete, and you need to ensure that the site is brought online in an orderly fashion. What should you do first? 

A. Restore the most critical functions to the new primary site.

B. Restore the least critical functions to the new primary site.

C. Restore all independent functions to the new primary site. 

8. Which site is usually maintained within the company and requires no contract with an offsite vendor? 

A. Redundant site

B. Hot site

C. Warm site

9.Which of the following is the MOST important element that an incident handler should possess?

A. Integrity

B. Ability to cope with stress

C. Presentation skills  

10. Which of the following is MOST important when deciding whether to build an alternate facility or to acquire a hot site operated by a third party?

A. Cost to rebuild information-processing facilities

B. Estimated annual loss expectancy

C. Location and cost of commercial recovery facilities   

11. Which of the following documents should be contained in a computer incident response team manual?

A. Severity criteria

B. Employee phone directory

C. Table of all backup files

12. Which of the following practices would best ensure the adequacy of a disaster recovery plan regular reviews of recovery plan information?

A. Regular audits of disaster recovery facilities

B. Regular reviews of recovery plan information

C. Regular recovery exercises regular

designing user interfaces

 

Designing User Interfaces 

Design an effective UI with any technology of your choice (e.g., FrontPage, Dreamweaver, or other) for a business you might like to start or lead.

  • Use one of the following methods to turn in your assignments
    • If you are using a server
      • ZIP your files and provide the URL to the assignment
      • Upload your files
    • If you do not have server access
      • ZIP your files and provide a screenshot of the assignment
      • Upload your files

 NOTE:  You do not need to create the rest of the pages unless you want to at the moment. Your UI should consist of at least the basic webpage components including the header, navigation, content layout and footer. Although you do not need to stylize the pages yet, you can do so in preparation for next week.

Resource
http://youtu.be/lSFDC643r-Y?hd=1

Textbook

Web Programming and Internet Technologies, 2nd ed. (2016). Scobey, P., & Lingras, P. Burlington, MA: Jones & Bartlett Learning.  

Chapter 3  
In this chapter, we will identify the importance of creating a distinction between content structure and its presentation. We will also examine HTML tags and elements and the important attributes for each.

Chapter 4
In this chapter, we will identify how CSS styles are used to communicate with various browsers and how HTML elements are displayed within each platform.

Paper

 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists.

 Topic: The Ethics of Workspace Surveillance