Sample Essay on:
IT Security Disaster Planning

Here is the synopsis of our sample research paper on IT Security Disaster Planning . Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3 page paper addresses issues of disaster planning while also examining and critiquing a relevant web site. Bibliography lists 4 sources.

Page Count:

3 pages (~225 words per page)

File: RT13_SA823IT.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

disruption or something more serious where infrastructure is lost (Hood, 2005). Within the information technology field, there are often disasters that come in the form or viruses or computer malfunctions, according to an article written by Botha & Solms (2008) at the Business Continuity and Disaster Recovery Planning Site. One problem is communication between firms, the government and other interested parties when significant situations affecting large populations arise. One example of this is Y2K. With respect to Y2K, the problem came about because programmers never took the next century into account. While there were many fears, this was something that did not end in disaster. Yet, it cost companies a great deal of money in terms of preparation and planning. It is proposed that communication between organizations can prevent future disasters as well as to alleviate the burden of disaster planning on one or a few firms. II. Significance of the Problem The problem is quite significant from an IT perspective. When many systems have the potential to go down, each organization or individual will be affected. Therefore, a fundamental solution should be attached to ameliorating problems through proper communications and planning for recovery. III. Technological Solutions to the Problem While the problem goes more to a lack of proper communication and decision-making, the truth is that there may be technological solutions to the problem. This is because individual firms can protect their own interests by employing disaster recovery strategies. Many of these involved IT protection such as the use of firewalls or changes in the system design. Organizations can also use preventative measures so that they are not affected by a widespread problem. For Y2K for instance, individual firms did take steps to prevent problems. Of course, using an IT ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now