Read the following articles, located below “Managing in a

Read the following articles, located below: “Managing in a Post-9/11, Post Katrina World: An Introduction to a Disaster-recovery Planning for Technical Communicators”“Recovering from Database Recovery: Case Studies and the Lessons They Teach” Note:Include these two (2) articles in your references section. These two(2) articles do not count towards the required number of references.After reading these articles, consider the following: The need for an organization to have a Disaster Recovery Plan.How the attacks of September 11, 2001 affected Barclay’s Capital and Putman Investments. Whetheror not Barclay’s Capital and / or Putman Investments had a disasterrecovery plan. If so, what were the parts of the plan that allowed eachof them to continue operations? If not, what should a disaster recoveryplan have included in order to continue operations? Write a three to four (3-4) page paper in which you: Identify the steps an organization should take to recover from a disaster and resume the business operations to normal mode.Suggest two (2) methods that organizations can use in order to mitigate the risk of data loss.Suggest two (2) methods that organizations can use in order to minimize the impact on personnel after a disaster.Examineboth Barclay’s Capital’s and Putman Investments’ situations onSeptember 11, 2001. Determine two (2) factors that contributed to asuccessful disaster recovery and two (2) factors that hindered asuccessful disaster recovery for each organization.Use at least three (3) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Betyped, double spaced, using Times New Roman font (size 12), withone-inch margins on all sides; citations and references must follow APAor school-specific format. Check with your professor for any additionalinstructions.Include a cover page containing the title of theassignment, the student’s name, the professor’s name, the course title,and the date. The cover page and the reference page are not included inthe required assignment page length. The specific course learning outcomes associated with this assignment are: Examine the challenges of computer security, including different threats and types of attacks.Use technology and information resources to research issues in Cryptography.Write clearly and concisely about Cryptography using proper writing mechanics and technical style conventions.

Read the following articles, located below “Managing in a

Read the following articles, located below: “Managing in a Post-9/11, Post Katrina World: An Introduction to a Disaster-recovery Planning for Technical Communicators”“Recovering from Database Recovery: Case Studies and the Lessons They Teach” Note:Include these two (2) articles in your references section. These two(2) articles do not count towards the required number of references.After reading these articles, consider the following: The need for an organization to have a Disaster Recovery Plan.How the attacks of September 11, 2001 affected Barclay’s Capital and Putman Investments. Whetheror not Barclay’s Capital and / or Putman Investments had a disasterrecovery plan. If so, what were the parts of the plan that allowed eachof them to continue operations? If not, what should a disaster recoveryplan have included in order to continue operations? Write a three to four (3-4) page paper in which you: Identify the steps an organization should take to recover from a disaster and resume the business operations to normal mode.Suggest two (2) methods that organizations can use in order to mitigate the risk of data loss.Suggest two (2) methods that organizations can use in order to minimize the impact on personnel after a disaster.Examineboth Barclay’s Capital’s and Putman Investments’ situations onSeptember 11, 2001. Determine two (2) factors that contributed to asuccessful disaster recovery and two (2) factors that hindered asuccessful disaster recovery for each organization.Use at least three (3) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Betyped, double spaced, using Times New Roman font (size 12), withone-inch margins on all sides; citations and references must follow APAor school-specific format. Check with your professor for any additionalinstructions.Include a cover page containing the title of theassignment, the student’s name, the professor’s name, the course title,and the date. The cover page and the reference page are not included inthe required assignment page length. The specific course learning outcomes associated with this assignment are: Examine the challenges of computer security, including different threats and types of attacks.Use technology and information resources to research issues in Cryptography.Write clearly and concisely about Cryptography using proper writing mechanics and technical style conventions.