Disaster Planning, computer science homework help
- For Part 1 of this assessment, use the organization and characteristics described in the Cha Cha Exports Case Study as the context for analyzing disaster planning issues indicated in the bullet points below.For Part 2, complete a hands-on exercise using the Toolwire virtual lab environment to use Directory tools that support disaster recovery planning. Capture two screen prints from your computer, one at the start of the lab, including time and date information, and another screen print of the completed lab, including time and date information. Be prepared to submit those screen prints as part of the assessment.The bullet points in Part 1 outline the topics that are to be addressed in this assessment. The scoring rubric informs the level of detail required at each of the competency levels covered in the rubric.
Part 1. Analysis of Disaster Planning Issues for Cha Cha Exports
Develop a report for leadership at Cha Cha Exports in which you analyze the following aspects of disaster recovery planning. Address specific needs and opportunities related to Cha Cha Exports and its particular makeup.The report should include the following sections:
A. Key Background
- Differentiate between security planning and contingency planning.
- Describe the importance of developing a disaster and incident recovery program.
B. Roles and Responsibilities
- Describe the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team.
C. Vulnerabilities
- Describe vulnerabilities created through inadequate disaster and incident recovery planning.
D. Controls Available
- Analyze the role of environmental controls in securing information assets.
- Analyze controls that are available to support the work of disaster and incident recovery planning.
Part 2. Application of Tools Supporting Disaster Recovery
- Complete the Toolwire lab linked in the Toolwire resources. In this lab, you will use Active Directory tools that support disaster recovery.
- When submitting your assessment, attach the two screen prints you were asked to capture as part of the lab to the assessment to document successful completion of the lab.
Additional Requirements
- Written communication: Written communication is free of errors that detract from the overall message.
- APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
- Page length: 6–8 double-spaced pages, not including the references page. In addition, attach your two screen prints documenting your lab completion.
- Font and font size: Times New Roman, 12 point.
Criteria | Non-performance | Basic | Proficient | Distinguished |
---|---|---|---|---|
Differentiate between security planning and contingency planning. |
Does not differentiate between security planning and contingency planning. | Differentiates incompletely or inaccurately between security planning and contingency planning. | Differentiates between security planning and contingency planning. | Differentiates between security planning and contingency planning, including the use of supporting examples. |
Describe the importance of developing a disaster and incident recovery program. |
Does not describe the importance of developing a disaster and incident recovery program. | Describes incompletely or inaccurately the importance of developing a disaster and incident recovery program. | Describes the importance of developing a disaster and incident recovery program. | Describes the importance of developing a disaster and incident recovery program, including the use of supporting examples. |
Describe the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team. |
Does not describe the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team. | Describes incompletely or inaccurately the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team. | Describes the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team. | Describes the roles that are appropriate for participation in a disaster recovery planning, implementation, and testing team, including support for the roles selected. |
Describe vulnerabilities created through inadequate disaster and incident recovery planning. |
Does not describe vulnerabilities created through inadequate disaster and incident recovery planning. | Describes incompletely or inaccurately vulnerabilities created through inadequate disaster and incident recovery planning. | Describes vulnerabilities created through inadequate disaster and incident recovery planning. | Describes vulnerabilities created through inadequate disaster and incident recovery planning, including the use of supporting examples. |
Analyze the role of environmental controls in securing information assets. |
Does not analyze the role of environmental controls in securing information assets. | Analyzes incompletely or inaccurately the role of environmental controls in securing information assets. | Analyzes the role of environmental controls in securing information assets. | Analyzes the role of environmental controls in securing information assets and explains how this role fits with an overall enterprise security management plan. |
Analyze controls that are available to support the work of disaster and incident recovery planning. |
Does not analyze controls that are available to support the work of disaster and incident recovery planning. | Analyzes incompletely or inaccurately controls that are available to support the work of disaster and incident recovery planning. | Analyzes controls that are available to support the work of disaster and incident recovery planning. | Analyzes controls that are available to support the work of disaster and incident recovery planning, including the use of supporting examples. |
Use Active Directory tools that support disaster recovery |
Does not use Active Directory tools that support disaster recovery. | Uses incompletely or inaccurately Active Directory tools that support disaster recovery. | Uses Active Directory tools that support disaster recovery. | Uses Active Directory tools that support disaster recovery and documents how these tools contribute to an overall enterprise security level disaster plan. |