How to overcome an incident in an Information technology company?

How do you overcome an incident in your Information technology company? Do a presentation and provide a full report to your executive board. 

 Clearly read – 
PowerPoint only accepted
20 Slides with references. APA formatting 
Require Turnirin report
No plagiarism 

 
Please note that this is a formal writing, all references (peer-reviewed) mostly must be cited appropriately within the text and clearly avoid plagiarism. Turnitin status percentage required while submitting in work.

Describe the main objectives of the Acme National Bank of America (ANBA) Disaster Recovery Plan (DRP).

This assignment consists of two (2) sections: a Disaster Recovery Plan (DRP), and a written DRP analysis. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.

Acme National Bank of America (ANBA) has branches in Miami, FL, Detroit, MI, New York, NY, Los Angeles, CA, Denver, CO, St. Louis, MO, and Atlanta, GA. Each branch has workstations or terminals that are connected to a central data center located in Chicago, IL. Each branch also has local servers and desktop computers that are not connected to the central data center.
Senior management is concerned about the following potential events that could affect the operations of ANBA. The events include:

Malfunctioning software
Workstations and servers malfunctions
Failed hard drives
Large-scale natural disasters such as hurricanes and earthquakes
Office fires
Computer virus outbreaks
Power outages caused by winter storm
Terrorist attacks

Section 1: Disaster Recovery Plan

Download the DRP template CIS527_A5_W9_ANBA-DRP.docx. Modify the template to create a Disaster Recovery Plan (DRP) for ANBA. Provide appropriate and accurate information for the areas outlined in the DRP template.

Section 2: Disaster Recovery Plan Analysis
    2. Write a five to seven (5-7) page paper in which you:

Describe the main objectives of the ANBA DRP.
Explain the key ways that ANBA’s DRP can help mitigate risk in the organization.
Defend the need for DRPs in an enterprise organization such as ANBA.
Infer on the difference between the elements of DRP between different branches of a multinational organization.
Use at least two (2)  quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Diagnose risk from unauthorized access to IT systems through proper testing and reporting.

 
Objective: The goal is to evaluate the process of joining a discussion forum group to analyze their “access controls.”  Please note: Do not use your primary, personal email address to sign up for the forum you select for this exercise. It is a good idea to have a secondary email address that can be used for this type of testing. Finally, please make sure that your virus and malware protection is up to date before you start this Exercise.
Tools required to complete Exercise: Internet Browser and search engine of your choice.
                          Suggested browsers: Chrome, IE, & Firefox
                          Suggested search Engines: Yahoo, Bing, Google, & Duckduckgo 
Directions: Please read all directions prior to starting this exercise.

Using your favorite search engine, type in one of the following search requests:

forum best video card
forum parenting tips
forum best hikes 

(Alternatively, you can choose something in which you are very interested and on which you might want some additional insights.)    Once you’ve located an acceptable forum, please go to the folder or “thread” where other users are discussing your selected topic. Make sure you are on a forum that asks you to “join” or “register” before you can create new posts or respond to posts created by other users.   Pay close attention to the forum’s registration process. The steps below will help you chronicle your experience of gaining access to the forum. Note: You will be required to take screen shots for several of the steps below. 

Create a Word doc. In the document, briefly state the topic you selected for your search and why you selected that topic. Then, provide the EXACT web address of the forum where you registered to post. 
Briefly describe the forum as well as the types of discussions/questions being asked by the other users.
Take screen shots of the verification process and paste the screen shots into your document. Did it have CAPTCHA? Did it require two-factor identification? Do not proceed if you are not comfortable with sharing the information the site is asking you to provide. If this occurs, please select another topic/forum.
Locate the End User License Agreement (EULA) on your selected forum and paste it in the document. This is the legal document to which you are agreeing when you join. You can read it in all cases, and in some cases you can also download it. In either case, make sure you include it with your submission.
Provide a brief description of all the steps your instructor or a fellow student would need to take to sign up for the same forum you selected in order to gain the same posting rights that you have.
What feedback would you give to the forum’s administrator to improve their access control strategy? If their access control strategy is exceptional, please explain why you feel this way. 

The specific course learning outcomes associated with this assignment are:

Diagnose risk from unauthorized access to IT systems through proper testing and reporting.
Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.