The analysis provides valuable information on the short- and long-term effects of a disaster. DLIS operations are comprised of a variety of interconnected tasks and process that are focused on providing vital logistical information to the DLA and therefore DOD.
DLA stands for the Defense Logistics Agency. DLA is DOD’s combat logistics support agency. In 1961, DLA was DSA (Defense Supply Agency), it was not until 1977 the name was changed to DLA (Defense Logistics Agency). (DLA, 2015) The Defense Logistics Agency (DLA) is an agency in the United States Department of Defense, with more than 26,000 civilian and military personnel throughout the world. Located in 48 states and 28 countries. DLA provides supplies to the military services and supports their acquisition of weapons, repair parts, and other material. DLA’s mission is to provide sophisticated logistics solutions to
Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to critical business operations as a result of a disaster, accident or emergency. A BIA is an essential component of an organization's business continuance plan; it includes an exploratory component to reveal any vulnerabilities and a planning component to develop strategies for minimizing risk.
What is the purpose of a Business Impact Analysis (BIA)? It identifies possible business failurs in a company. It looks at the resources that may be needed.
Teams are an integral component of organizational success. They take on many forms and functions and can have various structures. Teams also conduct a wide variety of projects with goals of innovation or mitigation. An example, from my experience, of a project that required the execution from a team was the establishment of a finished goods inventory program within a paper manufacturing company. A project of this magnitude required that a diverse and multifaceted team be assembled.
The Defense Logistics Information Services directors have the overall responsibility of managing risk, and the IT Manager is tasked with overseeing risk management processes and activities.
The Defense Logistics Agency (DLA) is the Department of Defense 's (DODs) main logistics combat support agency, providing global logistics support in both peacetime and wartime to all branches of the military services as well as several civilian agencies and foreign countries. The DLA provides the Army, Navy, Air Force, Marine Corps, federal agencies, and partner nation armed forces with a full range of logistics, acquisition, and technical services. DLA provides and sources all of the consumable things America 's military forces need to work – from sustenance, energy and fuel to uniforms, medicinal supplies, and construction material. DLA likewise supplies about 90 percent of the military 's extra parts, deals with the reutilization of military hardware, gives inventories and different logistics data items, and offers record automation and production services to a large group of military and government organizations. The Defense Logistics Agency is headquartered at Fort Belvoir, Virginia, and is a global enterprise. Wherever the United States has a critical military presence, the DLA is there to support their efforts. Since its founding in 1961, DLA has been an integral part of the nation 's military defense.
When performing a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The
Business impact analysis is the process of systematically addressing all of the risks associated with a solution and identifying if it actually worked. Many formulas exist, designed to show what factors are included when compiling an analysis. The simple formula of multiplying threats by your asset and dividing that total by mitigating factors represents an impact analysis. Threats are those instances that cause an operational or financial strain on your organization. These occurrences are the cause of limited operations during business hours or no operations at all and computed in time. Assets are defined as many elements, but are primarily composed of “physical assets (equipment, material, supplies, furnishings, etc.) that are owned by
Internet surfing might be at risk in this product as web commenced is in used.
DLIS has a warm site located 50 miles from the head quarter office ready to conduct business with a fully mirrored system and minimum staffing available in case of an unplanned interruption or disaster should occur.
Risk analysis. Once the BIA has been finished, distinguish the most basic business procedures and the supporting IT resources required by each.
The completion of any project depends on the execution of various parameters mostly set at the beginning of the project. In order to complete the project to satisfactory levels, the project must be completed within the stipulated timelines, fall within the approximate budget and be of the required quality standards. However, most of the projects are affected by adverse changes and unforeseen events that occur during the execution period. Research shows that the magnitude of change is dependent on the size of the project, with large projects experiencing more uncertainties due to several factors including; planning and design complexity, interest groups having deferring opinions, resource availability, Economic and political climate and statutory regulations, which may necessitate change of plan. Most of the uncertainties are known to occur in the concept phase and if not intervened, they may affect the entire project. The burden falls on the management of such risk as some managers choose to ignore the uncertainties since they call for additional costs. Other inherent risks may go unnoticed and therefore remain unsolved,
In addition to reading the course notes, I also looked at what APMBOK (Association for Project Management, Body of Knowledge 2009, 6th Edition, UK) said about this critical area of Project Management. Additionally, I researched what my Company does to maximize their effectiveness in this area by studying their attitude towards Risk Management throughout the complete life-cycle of a project, and finally I drew from my own knowledge and experiences in this critical area.
The multi-faceted risk management approach is when you put in place the needed precautions such as risk profile to protect yourself to the best of your ability. With this approach we realize that 100% secure is probably not attainable, and is even more likely not sustainable [1]. This means that there is really no possible way to make ourselves completely bullet-proof from attackers, while still keeping our ability to interact with the New World and use cyber-space. But the overall goal of this multi-faceted risk management approach is to make the return on investment for the hacker so low that they will give up and go elsewhere [1]. Why would the hacker just give up and go elsewhere? Well if you are secure to the point that the hacker is not skilled enough to get past your defense systems, and they do not want to spend the days, weeks, or months of time to find an exploit to make their way into your system, then they will just end up moving along to someone else that isn’t as secure as you. Hackers generally aren’t going to waste large amounts of time such as months trying to break into your secure system. They want to cause damage as soon as possible, or they want to obtain financial gain soon as possible. So if you are secure to the point that they cannot find a way into your system within a reasonable amount of time, they will just go find their way into someone else’s system that is not secure.