Discussions and Research paper
We develop good DR plans and some of those plans will include a remote recovery site (hot or cold). How do we ensure that the remote site is protected like we would the main location? Discuss the challenges of maintaining information security at a remote recovery location. ***Standard for all discussion posts: Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
Make an argument concerning the topic
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Review over the DR template and pick an industry such as (airlines, ecommerce, banking, etc.). Within that industry, pick a specific organization for the development of the Disaster Recovery Plan such as Healthcare – Physical Therapy Clinics – ATI. Pick an industry/company to focus on for this assignment. Based upon the given information you can find on the company and any past issues/breaches the company has gone through, create a Disaster Recovery plan using the template provided. Project selection is submitted for approval. ***Standard for all Research Assignments Your paper should meet the following requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Using the attached document, research and describe a selected automated IT security policy compliance system