Difference between revisions of "Major Application"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
m
m
Line 7: Line 7:
 
Related Terms: [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/> [[File:3D BCM Series BIA in the context of BCM books.jpg|thumb|left|140px|Conducting Your Impact Analysis For Business Continuity Planning]]<br/> {{BcmBoK 3 CL 2B}}<br/> <br/> {{BcmBoK 3 CL 2C}}<br/> <br/> {{BcmBoK 3 CL 2D}}<br/> <br/> [[File:WCCSG 2016 GooglePlus.jpg|thumb|right|300px|WCCSG 2016 GooglePlus.jpg]]<br/> <br/> <br/> <br/> <br/> <br/> [[File:A Manager Guide to IT DRP v1.1.jpg|thumb|left|140px|'''A Manager's Guide to Managing and Implementing Your IT Disaster Recovery Plan''' (2010)]]<br/> <br/> <br/> '''Courses: IT DR Certification'''
 
Related Terms: [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/> [[File:3D BCM Series BIA in the context of BCM books.jpg|thumb|left|140px|Conducting Your Impact Analysis For Business Continuity Planning]]<br/> {{BcmBoK 3 CL 2B}}<br/> <br/> {{BcmBoK 3 CL 2C}}<br/> <br/> {{BcmBoK 3 CL 2D}}<br/> <br/> [[File:WCCSG 2016 GooglePlus.jpg|thumb|right|300px|WCCSG 2016 GooglePlus.jpg]]<br/> <br/> <br/> <br/> <br/> <br/> [[File:A Manager Guide to IT DRP v1.1.jpg|thumb|left|140px|'''A Manager's Guide to Managing and Implementing Your IT Disaster Recovery Plan''' (2010)]]<br/> <br/> <br/> '''Courses: IT DR Certification'''
  
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-400-it-dr-manager/ Attend: DRP-200: IT DR Planner] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-planner-drcp DRCP]  
+
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-200-it-dr-planner/ Attend: DRP-200: IT DR Planner] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-planner-drcp DRCP]  
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-300-it-dr-implementer/ Attend: DRP-300: IT DR Implementer] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-specialist-drcs DRCS]  
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-300-it-dr-implementer/ Attend: DRP-300: IT DR Implementer] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-specialist-drcs DRCS]  
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-400-it-dr-manager/ Attend: DRP-400: IT DR Manager] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-expert-drce DRCE]  
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-400-it-dr-manager/ Attend: DRP-400: IT DR Manager] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-expert-drce DRCE]  

Revision as of 04:07, 23 August 2017

1. A Major Application is an application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to, or modification of, the information in the application.
Related Terms: Classification of Systems
Note: A breach in a major application might comprise many individual application programs and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the system is to support a specific mission-related function. br>
Conducting Your Impact Analysis For Business Continuity Planning

BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2B: Intermediate (BC)


BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2C: Intermediate (CM)


BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2D: Intermediate (DR)


File:WCCSG 2016 GooglePlus.jpg
WCCSG 2016 GooglePlus.jpg






A Manager's Guide to Managing and Implementing Your IT Disaster Recovery Plan (2010)



Courses: IT DR Certification

(Source: Business Continuity Management Institute - BCM Institute)