Computer Sciences and Information Technology
Risk Management
Read the article titled “9/11: Top lessons learned for disaster recovery,” from, located at , and consider the effects the attacks of September 11, 2001, have had on technology recovery efforts.
Write a two to four (2-4) page paper in which you:
Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives, and expenditures.
Analyze the use of social media and other current methods of communication for emergency notifications during an incident or disaster situation.
Determine whether or not organizations need to consider distanced geographic locations when preparing for backup operations / data centers, and determine the effects that recovery point objectives (RPO) and recovery time objectives (RTO) have on these decisions.
Evaluate the use of cloud services as tools for recovery operations within an organization, and explain how they could increase or decrease the effectiveness of recovery operations.
Determine whether or not cloud services are ideal recovery options for organizations regardless of their size. Provide a rationale to support the answer.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain risk management in the context of information security.
Summarize the various types of disasters, response and recovery methods.
Compare and contrast the methods of disaster recovery and business continuity.
Explain and develop a business continuity plan to address unforeseen incidents.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.
Risk Management
This involves identifying the risks and using resources available to minimize, monitor and control the possibility or outcome of unfortunate events. The September 11 attack also known as the 9/11 attack included a series of four organized attacks by terrorists. The attack leads to the death of 2,996 people, over 25000 people injured and destruction of property and infrastructure of at least $10 billion. The main aim of risk management is to ensure safety more so of the employees. As the towers collapsed more lives and properties were damaged, according to research the buildings were constructed to overcome impacts but not plan for the fuel load of the plane. Thus businesses took the initiative for the construction of standardized building’s code to deal with new threats, and also create better exit means and entrance for police and firefighters. Due to the sudden attack, most businesses had to close for a great period.
Due to this unforeseen threat businesses that had their chains concentrated in a single place suffered a great loss. Hence the initiative of relocating the branches to different geographical locations is being implemented to ensure productivity. Despite being a great attack most insurance companies did not suffer since they don’t have a terror insurance policy. This led to closure of businesses due to damage incurred thus the government introduced the terror risk insurance Act that share loss between the government and insurance companies. Social media can be used as an emergency management tool. It helps send disaster warnings, receive victim requests, monitor activities that may create suspicion and also use the pictures to estimate incurred damages. It also helps to prevent the breakdown of communication that may arise due to reliance on a single communication tool. It can also be used to send information and receive feedback by wall posts or messages (Burger, 2014).
Companies need to consider the geographic location because in the case of a disaster this will prevent the destruction and damage that may be caused to both the main site and the backup center. The recovery point objective entails the amount of data that can be lost before significant damage is an experience by the business. The recovery time objective involves the time applications can be down before causing major problems. This affects the geographical location decision since if the data center is too far the data may not be mirrored in real-time. Hence this disaster could cause data loss. The amount of time one has to wait before data recovery will also affect whether to store data on premise or cloud. A cloud-based recovery system enables the back-up and recovery of data on a cloud-based platform. It provides both the recovery point objective and recovery time objective.
It provides storage space and continuously updates the designated systems with the installed software. It also allows the users to add, edit, and delete systems without having to worry about it being backed-up. It’s effective for recovery since the process is faster. One can use the automated tools to automate the in-build cloud recovery process thus the cost, price and time will less compared to other recovery processes. It’s more flexible since this recovery facilities can be easily moved to other locations. It could also decrease recovery effectiveness since it’s not easy to recover a large amount of data, this takes time and may also have impacts on the local systems. Cloud recovery is ideal for all businesses since small businesses can use public cloud in storing the data. For large companies with big data and sensitive information that may have greater leakage risk can use the private or hybrid cloud in storing data. The data is also accessible from anywhere with the internet (Chan, 2019).

Burger, K. (2014, September 11). What Have We Learned About Risk Management Since 9/11? Retrieved from
Chan, M. (2019, June 17). How to improve your disaster recovery plan with the cloud. Retrieved from