Course Hero Logo

Lab 7 assessment worksheet perform a business impact

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 4 - 7 out of 19 pages.

Lab #7: Assessment WorksheetPerform a Business Impact Analysis for an IT InfrastructureChapter 12 of the Text BookCourse Name: IS3110 Risk Management in Information Technology SecurityStudent Name: Michelle Ilknur VonalInstructor Name: Anthony McCulloughLab Due Date: Aug 26 2013OverviewAfter completing your BIA report for your scenario and IT infrastructure, answer the followingLab #7 – Assessment Worksheet questions. These questions are specific to your BIA youperformed for your scenario and IT infrastructure. Justify your answers where needed.Lab Assessment Questions1.What is the goal and purpose of a BIA?
We have textbook solutions for you!
/Principles-of-Information-Security-6th-Edition-9781337102063-1162/
The document you are viewing contains questions related to this textbook.
Chapter 12 / Exercise 17
Principles of Information Security
Whitman
Expert Verified
to return to full operation following a disaster situation. The BIA will also identifythe resources required to resume business operations.2.Why is a business impact analysis (BIA) an important first step in defining a businesscontinuity plan (BCP)?
3.How does risk management and risk assessment relate to a business impact analysisfor an IT infrastructure?
4.What is the definition of Recovery Time Objective (RTO)? Why is this important to definein an IT Security Policy Definition as part of the Business Impact Analysis (BIA) orBusiness Continuity Plan (BCP)?
operations and service levels. The RTO defines the point in time after a failure ordisaster at which the consequences of the interruption become unacceptable.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 19 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
IT Systems, BIA
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Principles of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 12 / Exercise 17
Principles of Information Security
Whitman
Expert Verified

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture