Get help from the best in academic writing.

One piece of Garlic Bread free college essay help English Literature assignment help

Growing up I always wanted to be needed. Whether it was by my mother in the kitchen, my sister in the backyard, or my dad in the basement I loved the feeling of being required by someone in order to accomplish a task. As I grew up, I found I continued to have that want to be sought after and in the summer of 2010 I had that exact opportunity. I became a necessity, a “fountain of hope” as one put it or a “servant of the lord” as another said. I had the opportunity to bring life back into a city of destruction, to bring love where there was none, and to bring hope when all was gone. After traveling sixteen hours in a fifteen passenger van I was determined to change lives, unaware it would be mine that would instead be changed forever.
I was in New Orleans, a city that had looked death, destruction, and devastation in the eye and yet decided to pull together and help each other out in whatever means necessary even when many of them had nothing left to give. Although it had been five years since Hurricane Katrina had tragically taken everything from the majority of the people in New Orleans, from the look of the city it could have just happened yesterday. The houses were still spray painted from the National Guard’s inspection codes of “TFW”- toxic flood water, “2 B 1 D”- two bodies, one dog, or “EO”- electricity off. The streets were dirty with paper, mud, weeds, and just about everything else imaginable- the yards overgrown, the houses deserted, the neighborhoods childless. New Orleans had lost its vibrancy, its color, its hope and its life, all of which we hoped to help restore.
We came to devote an entire week solely as servants of God. We picked up trash, demolished houses, fed the homeless, cleared lots, had a carnival, gave away free clothes and much more all the while learning about faith, perseverance, hope, love, spirit, and determination. The congregation of our host church, Carver Desire continually taught us to always have hope even when no one would blame us for having none, to always have faith in God because everything that happens is part of his plan, and to always have love for ourselves and each other as in the grand scheme of the world we are all a family and all God’s children. However it was not until the sixth night of my trip, when we served dinner to the homeless in downtown New Orleans, that those lessons I had been learning all week truly hit home.
I had never seen so many famished, exhausted, dirty people in one place as I did that night. They came by bike, bus, and many by their own two feet desperate for anything we could give them. Men, women, children, teenagers, old men, and babies came in tens, hundreds and thousands. From among all the people I met and stories I heard, one man exceptionally stood out: A man by the name of David. He was A tall gray-haired man, who looked like it had been weeks since his last meal. We offered him everything from spaghetti and meatballs, Caesar salad, cookies, punch, and bread, all of which he refused besides a tiny slice of garlic bread. “That is all I need” He said, “Save the rest for the children or for the people who really need it.” Never have I ever been so amazed, astounded, or flabbergasted than I was that moment when A man who had absolutely nothing decided to take the bare minimum when offered a full meal. He had nothing to give yet in that moment he gave everything to one more man, woman, or child who would eat that night because he refused it. When we asked him how he would make it, as it was apparent he had not eaten in weeks, he just looked up at the sky and responded, “I’ll make it through the night, I have him” and turned to leave with his single piece of garlic bread and a smile on his face. The rest of the night I continued to hear stories of hope, hard work, and faith but nothing came close to my encounter with David. I could not stop thinking about his generosity and faith in God’s plan.
Although at the beginning of the week, we began as two separate churches and two separate communities in the end we became one. Rich or poor, black or white, female or male- we were one because as author of Greek fables, Aesop said, “United we stand; divided we fall”. Not only did I return home with a few souvenirs a bracelet one of the children made me and a New Orleans shirt to commemorate my trip, but also a sense of unity, faith, and hope. Immediately when I arrived home I exclaimed to my mom, “I know what I want to do with the rest of my life!” I had decided I wanted to become a biomedical engineer so I could devote my life to helping people and have the opportunity to be a new sense of a “fountain of hope” for those suffering from cancer, heart disease, or incurable diseases. I wanted to give everything to someone who was on the verge of losing hope and faith just like David had done that summer night in New Orleans. I wanted that utopian feeling I felt that week to continue with me my entire life as I continue and forever will want to be needed.

IT INFRASTRUCTURE AUDIT MANAGEMENT 19 Running head: IT INFRASTRUCTURE AUDIT MANAGEMENT 1

IT INFRASTRUCTURE AUDIT MANAGEMENT 19

Running head: IT INFRASTRUCTURE AUDIT MANAGEMENT 1

IT Infrastructure Audit Management

Name

Institutional Affiliation

Date Submitted

Section 1: Internal Information Technology (IT) Policy Audit

Internal IT audit of ABC Marketplace

Mission statement

The Information Security manager mission in the audit plan is being accountable for leading the audit and being unbiased in the evaluations and reviews of the achievements of the business. For any company, if carrying out the audit and establishing the project and policies plan in doing regular IT infrastructure audits for a retail firm ABC Marketplace having 268 stores countrywide is demanding. The department of internal audit may achieve this job through a thorough analysis of the operational infrastructure available at the time (Kim-Soon, 2012). The final audit schedule reviewed and approval provided by the company CEO along with the ABC Marketplace Board of Directors.

Scope

ABC Marketplace internal audit will entail the assessment and inspection of the productivity and capacity of the system of the organization internal control with performance superiority to perform assigned duties. Nevertheless, as the ISM hire for the work, I would have a responsibility to carry out the duties well along with the assistance of the available internal audit staff. Keeping and developing a detailed review program is critical to ensure consistency with measures of bookkeeping, the cloud systems, and long-term strategies important in protecting the mission of the company. Establishing and maintaining the quality collaboration system in assessing the internal audit operations is the most significant priority in the case of ABC Marketplace in the retail sector (Moeller, 2013). The audit may be carried out using a planned technique in the entire IT infrastructure involving core switches and Cisco workgroup. Cisco firewalls, Cisco routers, and avoidance of intrusion, and for most of the servers operating on the MS Windows Server 2012.

Furthermore, for the audit may be applying methods for refining and assessing the capacity of the internal controls in the cloud computing storage and the environmental analysis in applications for storage in the cloud. For establishing and keeping the quality system of confirmation to access the operations of internal audit in the most important priority, such project is meant in integrating the accompanying audit testing, themes, work paper arrangement consistency, audit and report readiness and audit, record maintenance, work paper survey, report issuance and report correspondence (Moeller, 2013). Thus, have a developed standard audit testing for its entire infrastructure this is the plan for future audits.

Goals and objectives

Goals

Carrying out audit and reporting findings to the Chief Executive Officer (CEO) to assist the company in accomplishing the highest efficiency and effectiveness level of integrity.

Supporting compliance with the laws, regulations, policies, rules, procedures, and agreements via reviews and analysis of the services and activities of the company

In implementing a solid IT infrastructure audits, the plan emerges as the strategy in piloting frequent audits in the IT infrastructure for the ABC Marketplace concerning regular basis while informing its outcomes to the CEO, the Board of Directors, and the Audit Committee (Moeller, 20130. Fortunately, our main goal is to help the company to achieve cost efficiency and effectiveness o the system.

In integrating into the audit assessment, the CEO, the Board of Directors, and audit committee provided us with the activity to examine over 1000 desktops with about 500 laptops which belong to the firm in the main operations center, therefore, permitting workers to bring their devices into the company has created the audit to become challenging. Nevertheless, the workers who come with their devices may be subjected, or a search upon exit and entry for the premises, new rules, and policies must have to be conducted in certain cases (Moeller, 2016). The general objective and the unbiased report in the internal audit are to help all members of managerial may discover the effective discharge process of their duties. Developing strong external and internal policies within the intranet network in better security by supplying them with the objectives analyzes from the lessons learn and after the security system analysis in place at the time. It presented to the audit appraisals of the CEO, and the Board of Directors.

In assisting with the review, internal auditors business has employed will perform independent reviews for evaluations and workers of the company’s operations and methods of the security policies to report to the ISM in bettering the comments and solutions. In the areas of demoting or promoting workers in the firm sufficient security systems on how much data or information a worker requires to comprehend of the internal controls, the policy in the business use for private data and information may not be contented with others (Moeller, 2016). Therefore enhancing operational effectiveness and efficiency is our goal since auditors in all workers working in the field have restricted access to the information resources; contractors and other outsource business partners.

Complying with applicable regulations and laws

In each audit venture is noteworthy, the auditing methodology is comparative in many engagements, and this includes nine stages. In each stage, the department of internal audit concentrates on the practices of minimizing risks and establishing efficiencies inside the zone. Customers and suppliers inclusively cultivated in each stage of the audit method. The audit may result in some measures of time redirected from the area of work forces normal schedule to reorganize among the main objectives in minimizing the time and restraining from disrupting the on-going processes.

Managing responsibilities and oversight

The capability of the internal audit was established at the head of the Board of Directors, and this determines its influence straightforward to the Chief Executive Officer. The internal audit extends responsibilities characterized inside the practice and that the Chief Executive Officer authorized. The Board of Directors offers oversight, governance, and guidance to the top management. The Board of Directors would be capable of making governance resolutions at the time of the audit project and after completing the project successfully (Moeller, 2016). In the case of ABC Marketplace.

Areas covered during the IT infrastructure audits

The important action of the internal audit that may promote the organization mission is the application of the consistent audits of the business operation association as outlined below. However, the complete management scope provided by the work of internal audit, or else it may integrate uncommon ventures and interviews as coordinated by the CEO and myself (Platkus, 2014). These include the IT disaster recovery and Business continuity management, use of cloud services, information privacy and security, system upgrades and implementation, and trade compliance.

The audits frequency

According to the current ISO 9001:2015 section 9.2 delineated that internal audits should still be carried at organized intervals to see whether the system of quality management conforms to the requirements of the organization with those of the standard of ISO 9001 in developing auditing plans (Platkus, 2014). The frequency must be selected for an organization that may be based on a project will be participating and the project requirements.

References

Kim-Soon, N. (2012). Quality Management System and Practices. Quality Management and Practices. doi:10.5772/36671

Moeller, R. R. (2013). Executive’s guide to IT governance: Improving systems processes with service managment, Cobit and ITIL. Hoboken (N.J.: John Wiley.

Moeller, R. R. (2016). Brink’s modern internal auditing: A common body of knowledge. Hoboken, NJ: Wiley.

Platkus, W. (2014). Visual Solutions for Management System Processes. Environmental Quality Management, 24(1), 15-23. doi:10.1002/tqem.21380

Section 2: Management plan

On the actual daily sales of the ABC Marketplace, the corporation operations depend on authentication, identification, and authorization of dependable access controls set in the place. In the case of a person with access to the retailer, business data when conducting business on the internet must have access only in that line of intent. For instance, purchasing the products offered by the firm. Thus, with various levels of access in different persons to different areas is important or the corporation which gives services on the internet (Coronel, Morris, Rob, & Coronel, 2013). It is because trust is considered two-way traffic, as people need to comprehend in this days majority of the buying is carried out through the modern IoT (Internet of Things) the highest of the work may protect the data or information, which goes on the purchase, and sale of the goods. The most challenging activity for individuals who handle the IT and database systems on a daily basis in the ABC Marketplace which owns close to 500 laptops and 1000 desktops.

Risk management

In the past, the corporate administration urgency to effectively and efficiently monitor the risks their companies experienced has been identified and acknowledged. The program administrators are under persistently pressure to identify their main business risks and activities with risks at satisfactory levels (Evans, 2012). Many companies are endeavoring to unite in their risk analysis into organization-wide approaches, exhaustive recognized as the Enterprise Risk Management (ERM). Small institutions and retailers in most industrially advanced nations and government departments are needed to understand the code of practice and rules related to the digital information safety with the entire information systems. In most cases, many corporations which carry out credit financial transactions using the internet in the United States are subjected to different kinds of government laws, code of ethics and guidelines which to adhere to in guarding the customers’ information of the company.

Establishment of protection and security consideration among the media, buyers, organizations and those people in authorities have induced the joining of the risk management finest approaches into new laws and regulations that exemplify higher working, security, protection, and information management models in organizations (Evans, 2012). The industry’s best approaches currently are constantly implemented with lawful requests in ensuring that the management relationship, system base, business operations, internal controls, and practices are sound, protected, and secure. Nevertheless, new regulations and laws direct on how companies operate, impart, represent, and safely interact throughout organizations and external gatherings such as suppliers, clients, major accomplices, and merchants. Constantly, as companies commit more considerations and assets to the ERM, the internal review capability sticking to similar patterns. Internal assessors are enlarging the extent, profundity, and recurrence of their risk appraisals for management techniques and projects. The restructured Sarbanes-Oxley Act that executes additional sanctions on the company financial reporting as the implication of the scandal of 2008 in Enron generated as the dual initiative designed by the five sector institutions and committed to guiding the company financial reporting corruption and fraud in the company senior level of management (Gantz, 2014). Thus, teaching financiers on the principles and rules by creating the persistent review of practices in the external or internal financial bookkeeping in the corporation.

System applications and software

The suggestion for a system upgrade would assist ABC Marketplace in realizing many benefits comprising of high efficiency and effectiveness on the hardware or software applications use in the system to manage the business, hence reducing cost via the main business processes automation would also be important when applied properly. All the information systems may be interconnected techniques operating together to assembling, stock, development, and distribution of information to promote resolution making, mechanism, direction, visualization, and examination in the ABC Marketplace business future. There may emerge complications during the execution and in the internal incorporation of the applications in the contemporary environment of the company. Therefore, the need to hire specialized project manager abilities with professional techniques in the auditing field, with leadership and capable of following instructions from the stakeholders to achieve the activities, thus developing substantial transformations to attain the goals needed in the ABC Marketplace with its current financial transactions (Gantz, 2014). For the management to maintain duties separation, they must be put in place activities for maintaining, controlling and monitoring systems software distinct from the duty for the application.

Wireless networking

The initial assessment of the wireless security audit papers for the ABC Marketplace may create and conduct the audit scope in the job to be done with the aims of ABC Marketplace. Concurrently, tracking down the comprehending of what the wireless security protocols have integrated into the system during the designing stage. Our recommendations and objectives would be providing all through the initial reviews and evidence discoveries, which would normalize the extent of the full inquiry and test the entire wireless, network (Williams, 2017). The requirements of having all the workers in the 268 stores and main office to carry out wireless network audit surveys frequently. The need for having a secure wireless network system access is to protect them from hackers by installing firewalls in the ABC marketing for all the wireless entry points. The specialists’ audit team needs to consider identifying wireless performance and security susceptibilities.

Cloud computing

Cloud computing storage has become a cultural reality and everyday activity in many organizations since it is the emerging technology, which would result in many advantages in the future. During this time, a person can only assume risks on how to configure ABC Marketplace distinctive model may transform and how the systems of cloud storage applications will operate and how to transfer its information and data to the cloud in making it useful and secure in the future (Williams, 2017). The CEO and Board of Directors must extend their reviews above the current IT risk departments in recognizing new techniques in running the range of risks that are associated with cloud computing mostly in the virtualization sector.

Cyber privacy and security services

ABC Marketplace runs its services across the impacts of frequent market globalization and the slow recovery of economic, the persistent need for urgency merging over cyber privacy and security services. The department of IT must develop new innovative solutions to address the arising security threats by concentrating on the ways to transform the way companies confront them. In developing more proactive cyber security practices, it may entail transitioning the means of using outdated reactive practices to the one developed to permit all the organizational factors to become part of the cyber security solutions. The resolutions must provide effective and efficient protection whereas enhancing the return on the investment in security (Williams, 2017). The department of IT may also ensure that they put the focus on sustaining the existing and pragmatic appearances of the risky of cyber security landscape and access how effective these measures applied in mitigating the business services risk and the information, which will emanate from these events.

BCP and DRP

The BCP (business continuity plan) and the Disaster recovery plan (DRP) are the processes methods, which intersect with one another. However, they help companies plan for disruptive human developed events or natural instances. In line with BCP, the ABC Marketplace may establish a sequence of the DRPs within its new executed system. The BCP concentrates on setting aside more money on the account for any issue emerging in the future compared to the DRP. The reserve money may be in the form of credit lines, capital, payments from clients and investors. It is the duty of the Board of Directors via the senior management and the CEO to put in place DRP or BCP implementation.

Network security

The network administrator handles the network security in controlling the network software and hardware, and security policies that needed to protect the network along with the company resources accessed all through the network from the illegal access. Besides, ensuring that employees have sufficient access to the resources and network to operate, the network security audit may consider two broad classification of information. These include static data like the system definitions, protocol applied, password rules, firewall definitions whereas the other classification will look into forms of data security system software dealing with the actions that happen.

References

Coronel, C., Morris, S., Rob, P., & Coronel, C. (2013). Database principles: Fundamentals of design, implementation, and management. Mason, OH: South-Western.

Evans, R. (2012). Click Here: Make the Internet Work for Your Business. Hoboken: John Wiley & Sons.

Gantz, S. D. (2014). The basics of IT audit: Purposes, processes, and practical information.

Williams, T. C. (2017). Filling Execution Gaps. doi:10.1515/9781501506390

Section 3: Project plan

ABC Marketplace project plan

The audit project aims at enhancing the ABC Marketplace network security. The company’s network security being compromised from within the system of intranet the aim of this audit project is to finish within the time limit and put in place all the network security policies for all the company devices comprising of the workers’ mobile devices (Asbury & Ball, 2016). The software of intrusion detection should satisfy all the requirements specifications, properly tested and finished on time. The project plan is outlined below, and this may direct the whole project implementation. Besides, it will control the project in the different projects that the ABC Marketplace will conduct.

Project name.

Duration

Start time

Completion time

Risk management

15days

Saturday 5/2017

Saturday 1/2017

Project preparation

8 days

Sunday 7/2017

Saturday 12/2017

Risk identification

8 days

Sunday 7/2017

Saturday 12/2017

Project testing

8 days

Sunday 7/2017

Saturday12/2017

Project plan on Risk management

Project name.

Duration

Commencing time

Completion time

System software and

applications

15 days

Saturday 5/2017

Saturday 18/2017

Project preparation

8days

Sunday 7/2017

Saturday 12/2017

Project cost

8days

Sunday 7/2017

Saturday 12/2017

Project testing

8days

Sunday 7/2017

Saturday 12/2014

Project on System software and application

Project name

Duration

Commencing time

Completion time

Wireless networking

15 days

Saturday 5/2017

Saturday 18/2017

Duration

7days

Sunday 7/2017

Saturday 12/2017

Project cost

7days

Sunday 7/2017

Saturday 12/2017

Project testing

7days

Sunday 7/2017

Saturday 12/2017

Project Wireless networking

(Marchewka, 2015)

Project name

Duration

Commencing time

Completion time

Cloud computing

15days

Saturday 5/2017

Saturday 18/2017

Project cost

8days

Sunday 7/2014

Saturday 18/2017

Duration

8days

Sunday 7/2014

Saturday 18/2017

Project testing

8days

Sunday 7/2014

Saturday 18/2017

The project Cloud computing storage

Project name

Duration

Commencing time

Finish time

 Cyber security and privacy

15days

Saturday 5/2017

Saturday 18/2017

Duration

8days

Sunday 7/2017

Saturday 18/2017

Project cost

8days

Sunday 7/2017

Saturday 18/2017

Project testing

8days

Sunday 7/2017

Saturday 18/2017

Project Cyber security and privacy

(Coronel, Morris, Rob, & Coronel, 2013)

Project name

Duration

Commencing time

Completion time

Network security

15days

Saturday 5/2017

Saturday 18/2017

Project cost

8days

Sunday 7/2014

Saturday 18/2017

Duration

8days

Sunday 7/2014

Saturday 18/2017

Project testing

8days

Sunday 7/2014

Saturday 18/2017

The project on Network security

(Hughes, Ireland, West, Smith, & Shepherd, 2012)

References

Asbury, S., & Ball, R. (2016). The practical guide to corporate social responsibility: Do the right thing.

Coronel, C., Morris, S., Rob, P., & Coronel, C. (2013). Database principles: Fundamentals of design, implementation, and management. Mason, OH: South-Western.

Hughes, B., Ireland, R., West, B., Smith, N., & Shepherd, D. I. (2012). Project management for IT-related projects: Textbook for the ISEB foundation certificate in IS project management. Swindon: BCS Learning & Development Ltd.

Marchewka, J. T. (2015). Information technology project management.

Section 4: Disaster recovery plan

Most areas of the businesses and individuals are experiencing economic issues with implications from the credit crisis of 2008. Nevertheless, the disaster recovery plans must not be considered as additional cost in cutting in the disaster recovery plans implementation during the challenging era. ABC Marketplace must apply its administration strategies presented early through the specialized auditor in control of the audit plan, thus ensuring to handle any unpreventable condition or scenario later our main objective as the ISM and qualified audit experts working in the audit is minimizing potential negative risks effects whereas optimizing on positive risks in ABC Marketing for the future. With potential instability levels around, the solid risk management plan with the detailed DRP need now more than before and to cut the plans would be falsifying economic move from the ABC Marketplace during these periods (Andrews, Dark, & West, 2017). At some degree executing and addressing DRP correctly is part of the issue in corporations. The firms need to perceive the plan as a key aspect of the outcome attained and the return on the investment.

The firm, ABC Marketplace operates under the national retail firms with 268 stores within the US and across the globe. The company office, employees, management, customers and contractors all rely on the IT infrastructure for their business transactions. The company’s facilities have the most transit networks of financial transactions for 24 hours each day and workers, customer, and all the users require attaining their work successfully (Heritage Programs (Or.), 2015). The IT and management services are carefully analyzed using the IT infrastructure with its components in daily critical functions. Each person engaged in the analysis has to arrive at the conclusion for the company, which does not have appropriate and detailed DRP plan in ensuring that the services may be re-established speedily within its entire disaster existence in any size.

The initial IT disaster recovery plan would represent the important requirements and steps to assume in any case of an event and recovery plan from any catastrophe affecting the IT services offered at ABC Marketplace. It is therefore, important for the company to develop available tools and resources to identify events before the event happens (Robertson, 2015). Persistent monitoring retort teams with the swift response acknowledge may be in place every day for 24 hours in monitoring where the event commences in its early phases. It is important for the company to this new phases of development designed for IT in disaster recovery plan. They need to educate workers and training of the new workers on the way of complying with security standards regulations and policies of the organization with the ultimate goal of allowing basic business operations to resume and remain on till all the systems may redevelop to pre-disaster operational before any incident.

Reaction to events and recovery from the events is challenging with economic implications when not well executed. At the company events are controlled by the EMC (emergency council members) stated in the emergency preparedness plan section two. Their tasks are to oversee events and contra-attack the event, writing to the EPP located at the main office concerning network security with the other unspecified place for the company’s safety (Robertson, 2015). Therefore, when an event of a catastrophe occurs management have immediate access to the company’s data and should be providing the correct information of in which event it occurs to appear. The event response team will then have 48 hours to devise solutions to the incident and on the way of resolving the incident. The incident at ABC Marketplace does not operate on redundant servers or even the organization have the redundant hot-site or warm site in the audit period. Nevertheless, the ABC Marketplace installed in their system a tool referred to Norton Ghost as the data mirror mechanism tool in its backups that would decrease possible business disruption in an incident of a disaster. The goal is to reduce the impact of the disaster in an extend time, if must more assets emerged to require it, the plan may be re-assessing and updating according with the DRP developed in its Emergency preparedness plan. Event response managers require proving to the company preparedness in any event occurrence (Watters, 2014). Thus, management must have confidence that their project is successfully executed according to the audit plan developed in the contact with most significant, strengthening the DRP capabilities of an organization.

A scenario of disaster recovery

A disaster recovery incident that may be resolved within the project plan scope is the loss of access to the center of a computer along with data processing capacity of the network and systems connectivity. In the incident where there is loss of access to any company store could be much probable. The DRP may only be linked with the recovering of important communications and essential systems. In the work plan, I will envision the scenario in which all the office equipments within the computer room may not be salvaged and that each important telecommunication capacity declared lost (Watters, 2014). In this circumstance of a declared catastrophe, the key staff may take an immediate action to alert the center for disaster recovery.

The disaster recovery strategy may be integrated into the disaster recovery plan; the goal is relocating important information system processing in alternating computer-processing center. The procedure is to follow providing the name and the DRP hot-site location. Thus, the service provider may be responsible for ensuring the system configuration with its related network systems needs have a correct updates need based on the system of technical feasibility in the system in recovering from the event. ABC Marketplace need to conduct testing annually being part of the alternating processing strategy in each of the 268 stores and the head office of the company (Watters, 2014). Besides, the related network connectivity recovering in the scenario of disaster recovery, applying other strategy of processing developed in the DRP.

It is important to involve all the stakeholders with other individuals affected in the disaster recovery plan. These ranges from the employees to suppliers to customers may assist in assuring that retrieval of all the methods is organized well and implement better than the initial time. Therefore, based on the need of an organization to offer the entire process of recovery promptly, it is possible to all the sections. Besides, we should find out regular turnaround periods from the services of suppliers because the supplier anticipate ABC Marketing may prioritize its recovery endeavors to the peaceful matter without causing any issues (Robertson, 2015); In the manner, developing security awareness among all of its workers and capable to following instructions during a crisis. According to the cloud, firms and outsourcing staff, which provide services to the company, may be sufficiently contacted with the data necessary in initiating the disaster recovery plan process to recover the information and other items of networking.

Conclusion

In summing up, risk may be controlled but not eliminated in its totality, thus organization such as ABC Marketplace are tested with disasters in the past of unavoidable risks. It enables the company to establish, maintain, and practice the contingency plan place by their professional auditors. The concept of management while creating the DRP is to produce all through the company a dependable building square procedure authorized by the CEO, stakeholders of the firm and operate together with the components available in initiating improvement in the ERP.

References

Andrews, J., Dark, J., & West, J. (2017). CompTIA A+ guide to IT technical support.

Heritage Programs (Or.). (2015). Disaster recovery tools.

Robertson, G. (2015). Disaster planning for libraries: Process and guidelines.

Watters, J. (2014). Disaster recovery, crisis response, and business continuity: A management desk reference.