Explore BrainMass

Communication recovery plan

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

Consider a natural or man-made disaster, and discuss how a communications network could be recovered from such a disaster. Refer to communication issues experienced during and after the tsunami in December of 2004 or similar issues experienced in the aftermath of Hurricane Katrina in August of 2005. Provide at least one resource to support your answer.

© BrainMass Inc. brainmass.com October 24, 2018, 9:58 pm ad1c9bdddf

Solution Preview

Communications failures during Hurricane Katrina in August of 2005
Many telephones, including most cell phones, and Internet access were not working due to line breaks, destruction of base stations, or power failures, even though some base stations had their own back-up generators. In a number of cases, reporters were asked to brief public officials on the conditions in areas where information was not reaching them any other way.

All local television stations were disrupted. Local ...

Solution Summary

The solution provides a discussion on how communication networks can be recovered from a natural or man-made disaster. The disaster which is discussed is aftermath of Hurricane Katrina in 2005.

See Also This Related BrainMass Solution

Security, Privacy, and Other AIS Issues

1. Security, Privacy, and Other AIS Issues
You've been hired by a growing organization to perform systems consulting work. The CEO has concerns about systems security and the impact of privacy considerations on the organization's AIS. She is also interested in learning more about new and emerging AIS technologies that the organization should consider. You have been asked to provide a report on these areas. Your report will be used as a basis for planning and developing improvements to the AIS.

Prepare a paper to deliver your findings to the CEO. In your paper, include the following:

a. A disaster recovery/contingency plan that includes the following:
b. Identification and analysis of procedures to detect vulnerabilities and security threats (i.e., controls)
c. Identification and analysis of risks and risk mitigation measures, including plans for
i. Systems and data recovery
ii. Off-site data storage
iii. Business continuity
c. An analysis of the impacts of privacy considerations on AIS (i.e., HIPAA)

Use at least two academically peer-reviewed sources and/or your text author to support your work or your text authors. Be sure to properly cite any references used in your summary. Format the summary according to APA style.

peer-reviewed sources :

HIPPA engagement help. (2003, April). Practical Accountant, 36(4), 10.

Justices: FERPA does not give student right to sue. (2002, Summer). News Media & the Law, 26(3), 34.

Abu-Musa, A. A. (2002, September). Computer crimes: How can you protect your computerized accounting information system? Journal of American Academy of Business, 2(1), 91.

Abu-Musa, A. A. (2002, September). Security of computerized accounting information systems: A theoretical framework. Journal of American Academy of Business, 2(1), 150.

Blackwell, R. (2002, June 17). With N.D. vote, privacy debate returns to fore. American Banker, 167(115), 1.

Bradbury, D. (2003, October 28). How to stay on the right side of the law. Computer Weekly, 48.

Crane , B. (2003, June 30). Small business and the new HIPPA privacy and security requirements -- what every Utah CEO needs to know. Enterprise/Salt Lake City, 33(1), 3.

Greenblatt, R. E. & Bakker, J. J. (2004, Spring). HIPAA privacy compliance: It''s time to take it seriously. Benefits Law Journal, 17(1), 102.

McCarthy, E. (2004, May). The best-laid plans. Journal of Accountancy, 197(5), 46.

Millman, G. J. (2004, July/August). Keeping data under lock & key. Retrieved on July 16, 2004 from Smartpros.com at http://www.smartpros.com/x44287.xml.

Naumann, J. W. (2004, May). Tap Into XBRL''s power the easy way. Journal of Accountancy, 197(5), 32.

Odell, P. (2003, February). HIPPA changes require close study, DMA exec says. Direct, 15(2), 9.

Parker, R. G. (2003, May). How to profit by safeguarding privacy. Journal of Accountancy, 195(5), 47.

Phelan, S. & Hayes, M. (2003, April). Before the deluge -- and after. Journal of Accountancy, 195(4), 57.

Richards, J. & Tower, G. (2004, March). Progress on XBRL from an Australian perspective. Australian Accounting Review, 14(1), 81.

Stewart, D. L. (2001, June 29). To protect and to serve. Intelligent Enterprise, 4(10), 42.

View Full Posting Details