Question:
Discuss about the Risk Management of the AE Kalina Cycle.
Business Impact Analysis is the systematic approach for determining and evaluating the possible effects for breaking the critical business operations as a result of a disaster, calamity or emergency. It is an essential component of the organisations business continuous plan. It generally includes a descriptive component to expose the susceptibilities and for this planning component is essential developing the strategies so as to overcomer from the risks or the disasters (Scholten et al., 2014). Business continuity process analyses the critical function which mainly identifies and computes to the greater impact of the loss of the functions. It basically identifies the effects on the financial, life, regulatory, legal etc. of the natural and the man-made events on business operations.
The risk assessment is an easy way of identifying the potential hazards such as any disaster calamity like earthquake, supplier failure, fire or cyber-attack, which generally tends to evaluate the areas which are more prone and our vulnerable for occurring of the hazards. Risk assessment generally includes the people, property, supply chain, information technology, business reputation etc. A mitigation strategy has been developed for reducing the maximum probability of occurrence of any hazardous activity which have the significant impact on it (Pritchard and PMP, 2014). In the risk assessment stage the BIA is been examined against the hazardous scenarios which have the adverse effects on impacting on the business operations. It is generally used for making the justification in the cost from prevention and mitigation of the risks for implementing and designing the strategies
It is the heart of all good calamities or the disaster recovery planning projects. It is essential for collecting the data and information from the organisations. Those organisations that can actually access to the functions and can perform to all the business operations can access to the critically business functions. The big data collection can actually collected from the interviews, workshops, questionnaires etc. It is important to have a clear picture of all the documents and the main mission on the critical analysis on the collection of the information.
Step one of the BIA Process- Identification of the key systems, functions, processes, etc. which are critical for the success of the organisation. As these processes are the significant areas where any failure would cost the company to suffer heavy losses. Information security in these areas is indispensable so to maintain the smooth functioning of business. Following are some of the areas where data is required to be safeguarded using proper risk management techniques.
Mission/Business Process |
Description |
System Failures |
Any unwanted threats or malicious activities happened in the system from the intruders. |
Natural Disasters |
Any natural calamity occurred in an organization |
Human Caused Catastrophes |
Risks arise due to the frauds made in the organization by the personnel’s or using the essential information and sharing to the public domain. |
Cost and loss of income in the legal uncertainty, cost of litigation. |
Identify Outage Impacts and Estimated:
They are the adverse effects because of the failures in the respective field.
Mission/Business Process |
Impact Category |
||||
Insignificant |
Minor |
Major |
Catastrophic |
Impact |
|
System Failures |
ü |
Loss in the system failures due to unwanted files and folders affected by the intruders. |
|||
Natural Disasters |
ü |
Occurrence of the Natural Calamity which mainly destroy the business processes and organization. |
|||
Human Caused Catastrophes |
ü |
When the human change the relevant information and data which has the original file and folders change it into duplicate files and Loss in the Sensitive Information. |
|||
Legal Costs Risks |
ü |
If the breach of information security acts various penalties, fines and other governmental actions are imposed. |
Maximum Tolerable Downtime (MTD)-It is used for identifying the time duration taken for detecting the risks in all the business process in which it can be engaged before the significant damage or to the long term feasibility is threatened. They are been published in to the same database or the spread sheets which specify all the business processes (Li et al., 2017).
Recovery Time Objective (RTO) – It is the period of time from the risk been detected to the recommencement of all the business process.
Recovery Point Objective (RPO) – It is the maximum period of the data been loss when the disaster counting backwards.
Mission/Business Process |
MTD |
RTO |
RPO |
System Failures |
72 hours |
48 hours |
12 hours (last backup) |
Natural Disasters |
1 week |
15days |
48 hours |
Human Caused Catastrophes |
24 hours |
48 hours |
12 hours |
Legal Costs Risks |
24 hours |
24 hours |
12 hours |
System Resource/Component |
Platform/OS/Version (as applicable) |
Description |
Web Server 1 |
Optiplex GX280 |
Web Site Host |
Web Server2 |
Ubantu 14.04 |
Operating System |
Web Server 2 |
Windows 10 |
Operating System |
Web Server 3 |
VcloudAir |
Database Storage |
Identify Recovery Priorities for System Resources
Priority |
System Resource/Component |
Recovery Time Objective |
Web Server 1 |
Optiplex GX280 |
24 hours to rebuild or replace |
Web server 3 |
VcloudAir |
1 week to recover data |
Web Server 2 |
Ubantu 14.04 |
15 days to recover the loss |
Conclusion
It is essential in today’s scenario from preventing for the risks and the threats which has occurred in an organisation so as to mitigate the risks. The main effectiveness of accessing the risks totally depends upon the improvement in the organisation and the proper strategies being implemented on time. It is essential to have the security postures on the events which have been placed in an organisation whether it is good or bad so that the prevention should be made and to have the continuous business process and continuity in the business operations in near future.
References
Berger, R., 2015. The challenges of introducing ERP in SMEs| IT Industry| Industrial know-how| Expertise| Roland Berger.
Chen, J., Sohal, A.S. and Prajogo, D.I., 2013. Supply chain operational risk mitigation: a collaborative approach. International Journal of Production Research, 51(7), pp.2186-2199.
Li, H.J., Chang, S.I. and Yen, D.C., 2017. Investigating CSFs for the life cycle of ERP system from the perspective of IT governance. Computer Standards & Interfaces, 50, pp.269-279.
Pritchard, C.L. and PMP, P.R., 2014. Risk management: concepts and guidance. CRC Press.
Scholten, K., Sharkey Scott, P. and Fynes, B., 2014. Mitigation processes–antecedents for building supply chain resilience. Supply Chain Management: An International Journal, 19(2), pp.211-228.
Verner, J.M., Brereton, O.P., Kitchenham, B.A., Turner, M. and Niazi, M., 2014. Risks and risk mitigation in global software development: A tertiary study. Information and Software Technology, 56(1), pp.54-78.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download