Verified Document

Assurance According To M. Miller Thesis

According to Derek Slater, a further reason for a basic unwillingness to place a large amount of emphasis upon disaster recovery planning is because disastrous events are regarded as large unlikely. Business owners therefore tend to view such planning as less important than other business functions, such as new product promotion and investment. Slater however further emphasizes the importance of recognizing that businesses are not only affected by large-scale disasters, but also by smaller-scale problems such as malfunctioning computers or viruses. An adequate business continuity and disaster plan is therefore indeed important in order to ensure that the business can continue functioning regardless of whatever mishaps may occur.

Computer security issues as well as risk analysis and business continuity and disaster planning are integrated business issues in today's workplace environment. Most businesses today function on the basis of computers and programming. These machines and programs form the lifeblood of the business. It is therefore vital that unforeseen events and risks be quantified and thoroughly planned for to prevent...

The most likely risks should be assessed and mitigated by software to not only admonish and deter, but rather to prevent costly violations and disasters from occurring. In this way, the company will ensure its long-term functionality and security.
Sources

1. Basic Principles of Information Protection http://cap-lore.com/CapTheory/ProtInf/Basic.html

2. The Business Continuity Planning & Disaster Recovery Planning Directory. Retrieved from the World Wide Web: http://www.disasterrecoveryworld.com/

3. Miller, M. Computer Security: Fact Forum Framework." Retrieved 08/03/08, from the World Wide Web: http://www.caplet.com/security/taxonomy/index.html

4. Schneier, Bruce. http://schneier.com/index.html

5. Slater, Derek. (n/a). Business Continuity and Disaster Recovery Planning: The Basics. Retrieved, from the World Wide Web: http://www.csoonline.com/article/204450/Business_Continuity_and_Disaster_Recovery_Planning_The_Basics

Sources used in this document:
Sources

1. Basic Principles of Information Protection http://cap-lore.com/CapTheory/ProtInf/Basic.html

2. The Business Continuity Planning & Disaster Recovery Planning Directory. Retrieved from the World Wide Web: http://www.disasterrecoveryworld.com/

3. Miller, M. Computer Security: Fact Forum Framework." Retrieved 08/03/08, from the World Wide Web: http://www.caplet.com/security/taxonomy/index.html

4. Schneier, Bruce. http://schneier.com/index.html
5. Slater, Derek. (n/a). Business Continuity and Disaster Recovery Planning: The Basics. Retrieved, from the World Wide Web: http://www.csoonline.com/article/204450/Business_Continuity_and_Disaster_Recovery_Planning_The_Basics
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now