Difference between revisions of "Major Application"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' A Major Application is an application that requires special attention to security due to the [[Risk|risk]] and magnitude of the harm resulting from the [[Loss|loss]], misuse, or unauthorized access to, or modification of, the information in the application. <div class="thumb tright">
+
| '''1.''' A Major Application is an application that requires special attention to security due to the [[Risk|risk]] and magnitude of the harm resulting from the [[Loss|loss]], misuse, or unauthorized access to, or modification of, the information in the application.
 +
{{Template:BL-DR-5Banner}}
 +
<div class="thumb tright">
 
{{#ev:youtube|rbPl0XU0RQ0|350}}
 
{{#ev:youtube|rbPl0XU0RQ0|350}}
 
</div>  
 
</div>  
Related Terms: [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/> [[File:3D BCM Series BIA in the context of BCM books.jpg|thumb|left|140px|Conducting Your Impact Analysis For Business Continuity Planning]]<br/> {{BcmBoK 3 CL 2B}}<br/> <br/> {{BcmBoK 3 CL 2C}}<br/> <br/> {{BcmBoK 3 CL 2D}}<br/> <br/> {{WCC H}}<br/> <br/> <br/> <br/> <br/> <br/> [[File:A Manager Guide to IT DRP v1.1.jpg|thumb|left|140px|'''A Manager's Guide to Managing and Implementing Your IT Disaster Recovery Plan''' (2010)]]<br/> <br/> <br/> '''Courses: IT DR Certification'''
+
'''Related Terms''': [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/><br/> {{BcmBoK 3 CL 2B}}<br/> <br/> {{BcmBoK 3 CL 2C}}<br/> <br/> {{BcmBoK 3 CL 2D}}
 
+
<br> <br> <br> <br> <br> <br>  
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-200-it-dr-planner/ Attend: DRP-200: IT DR Planner] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-planner-drcp DRCP]
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-300-it-dr-implementer/ Attend: DRP-300: IT DR Implementer] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-specialist-drcs DRCS]
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-400-it-dr-manager/ Attend: DRP-400: IT DR Manager] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-expert-drce DRCE]
 
*[https://www.bcm-institute.org/courses/it-disaster-recovery-plan-itdrp-certification-courses/drp-5000-it-dr-expert-implementer/ Attend: DRP-5000: IT DR Expert Implementer] leading to [http://www.bcm-institute.org/certification/disaster-recovery-certified-expert-drce DRCE]
 
  
 +
{{Template:BLCoursesBanner}}
 +
{{Bcm Institute Source}}
 
|}
 
|}
  
{{Bcm Institute Source}}
+
{{Template: BookMGITDRPlan}}
 
 
 
[[Category:BCM Institute Glossary]] [[Category:BCM Institute Crisis Communication Glossary]] [[Category:BCM Institute DR Glossary]] [[Category:BcmBoK 3 CL 2B]] [[Category:BcmBoK 3 CL 2C]] [[Category:BcmBoK 3 CL 2D]]
 
[[Category:BCM Institute Glossary]] [[Category:BCM Institute Crisis Communication Glossary]] [[Category:BCM Institute DR Glossary]] [[Category:BcmBoK 3 CL 2B]] [[Category:BcmBoK 3 CL 2C]] [[Category:BcmBoK 3 CL 2D]]

Latest revision as of 07:30, 27 October 2020

1. A Major Application is an application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to, or modification of, the information in the application.

Related Terms: Classification of Systems
Note: A breach in a major application might comprise many individual application programs and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the system is to support a specific mission-related function. br>

BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2B: Intermediate (BC)


BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2C: Intermediate (CM)


BCMBoK Competency Level
BCMBoK 3: Business Impact Analysis CL 2D: Intermediate (DR)







(Source: Business Continuity Management Institute - BCM Institute)