IS3110 Lab7 Student Name: Tom Fletcher
Submission Requirements
Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_U7L1_Firstname_Lastname
Email to: SMichnick@itt-tech.edu
Due By: 6:00 PM CDT, Wednesday August 6, 2014
Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.
Please refer to Pages 46-52 of the IS3110 Student Lab Manual when working on this lab.
Lab #7 – Perform a Business Impact Analysis for a Mock IT Infrastructure
Overview
When performing a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The
…show more content…
2. Why is a business impact analysis (BIA) an important first step in defining a business continuity plan (BCP)?? It allows you to address the critical issues and possible risks
3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure? It shows the weaknesses in your network and how you plan to address them.
4. What is the definition of Recovery Time Objective (RTO)? Why is this important to define in an IT Security Policy Definition as part of the Business Impact Analysis (BIA) or Business Continuity Plan (BCP)? Is the targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity. The reason for identifying security policy definitions is to make it clear to the organization what these areas are and how you plan to fix them.
5. True or False - If the Recovery Point Objective (RPO) metric does not equal the Recovery Time Objective (RTO), you may potentially lose data or not have data backed-up to recover. This represents a gap in potential lost or unrecoverable data. False
6. If you have an RPO of 0 hours – what does that mean?
That is will take less
Type the answers to the assignment questions below. Use complete sentences unless the question says otherwise. You will have more than one day to complete an assignment. At the end of each day, be sure to save your progress.
* Submit USB or CD containing the Excel file with your report to Assignment Minder. If using this method, you must ensure that the USB or CD is securely attached inside the document
3. A redo algorithm is performed for a transaction that commits after the last checkpoint from the log
This assignment should be submitted via the Electronic TMA (eTMA) system. You should write your solutions to the questions in a single wordprocessed document, which is named using your OUCU (e.g. tst99) as follows: tst99_TMA01 Head the document with your name, the number of the TMA (as given above) and your Personal Identifier. You do not need to include any other forms with your document. Submit your document as a zip file to the eTMA system on or preferably before the cut-off date shown above. You will find details on how to create a zip archive file in the
The Business Impact Analysis will generate interest, support, and momentum in the continuity project as a whole and a risk analysis can greatly reduce the cost of insurance, by identifying and quantifying a potential loss, thereby allowing the risk manager to avoid over or underinsuring the risk. A BIA will allow management to make timely decisions about future business issues. This is accomplished by looking at impacts, over time. (p108 J.F. Broder)
2-conduct business impact analysis (BIA). BIA helps to identify and order critical information systems and modules that support the organization's assignment / business functions.
involve the identification, selection, implementation, testing and updating of processes and specific actions necessary to prudently protect criticial busin precesses from the effects of major system and network disruptions and to ensure the timely restoration of business ops if significant disruptions occur
Conducting a business impact analysis (BIA) is usually the first step when creating a business continuity plan. The BIA is used to identify and measure business related impacts and minimize losses that could occur during the disruption of processes in the organization. The main purpose of a BIA is to pinpoint what assets are necessary for the organization’s recovery from an incident or disaster. The BIA is also used to identify adverse impacts to the organization that are caused by disasters. “A component can be a function or process. How detailed the component definition is depends on the organization (Johnson & Merkow, 2011, p. 278)”. The component priority phase of the BIA consists of identifying business functions and processes, defining BIA scenarios and components, determining financial and service impact of components not being available, and establishing recovery time frameworks. The component reliance phase of the BIA consists of identifying component dependencies, resources required to recover components in the event of a failure, and human assets needed to recover components. With effective BIA implementation, the organization will be able to recover its processes in any situation or condition.
Recently, most of the organizations with BI Programs are making a paradigm shift to Agile BI which involves both process oriented and technical approach to implement BI projects. Agile BI constitutes organization’s ability to prepare its BI program to meet the evolving requirements of the business and its operations.
Over the last several years, business continuity planning has become an essential tool that is used to help firms prepare for different contingencies and account for uncertainty. During this process, there is a focus on the effects it will have, in the form of a business impact analysis (BIA). To fully understand how this is influencing organizations requires carefully focusing on: the methods for establishing component priorities, determining reliance / dependencies and providing recommendations for the development of the plan. Together, these elements will highlight the most important aspects which should be taken into account.
The ongoing evaluations of the business continuity plan (BCP) covers areas like considering all possible threats, testing the plans, analyzing key dependencies and interdependencies, reevaluating the recovery plans already in place, and checking alternate sites for IT backup. “Having a BCP enhances an organization 's image with employees, shareholders and customers by demonstrating a proactive attitude. Additional benefits include improvement in overall organizational efficiency and identifying the relationship of assets and human and financial resources to critical services and deliverables (Minister of Public Works, 2015).” Major policy and procedural changes will only need to take place if
Avalution defines the BIA as an identification and analysis of business processes/activities (including required resources), with the objective of understanding the impact of downtime, which drives the assignment of recovery objectives and prioritization.
Recovery Point Objective (RPO) – this is the extent or amount of data loss that a critical business system can tolerate.
This report outlines 15 major advantages of using BIM software following by a description of 10 critical conflicts in the Tekla demo model as a practical exercise.
The Recovery Time Objective (RTO) specifies how long an organization will need to recover. Organizations may have multiple RTOs depending on the data involved. For example, one RTO may specify how long before the major functions of the enterprise are back on line while a second, longer, RTO will determine how long until everything is fully recovered. It is an important consideration in disaster recovery planning