Examlex
The CFO of Exeter Corporation is very uncomfortable with its current risk exposure related to the possibility of business disruptions.Specifically, Exeter is heavily involved with e-business and its internal information systems are tightly interlinked with its key customers' systems.The CFO has estimated that every hour of system downtime will cost the company about $5,000 in sales.The CFO and CIO have further estimated that if the system were to fail, the average downtime would be about 2 hours per incident.The have anticipated (assume with 100% annual probability) that Exeter will likely experience 10 downtime incidents in a given year due to internal computer system problems, and another 10 incidents per year due to external problems; specifically system failures with the Internet service provider (ISP).Currently, Exeter pays an annualized cost of $25,000 for redundant computer and communication systems, and another $25,000 for Internet service provider (ISP) support just to keep total expected number of incidents to 20 per year.Required:
a.Given the information provided thus far, how much ($) is the company's current expected gross risk?
b.A further preventative control would be to purchase and maintain more redundant computers and communication lines where possible, at an annualized cost of $30,000, which would reduce the expected number of downtimes per year to 5 per year due to internal computer system problems.What would the dollar amount of Exeter's current residual expected risk at this point?
Group Members
Individuals who are part of a collective or team, each potentially contributing unique skills or perspectives.
Input
The information, resources, or material provided to a system or process to achieve an output or result.
Situational Approach
A theory of leadership that proposes effective leaders adapt their style to the demands of different situations.
Leader Behaviors
The actions and decisions made by a leader that influence their effectiveness in guiding and directing their followers.
Q19: System flowcharts use only four symbols.
Q23: The feature of a database management system
Q44: _ is the intentional unauthorized access of
Q44: Who is legally responsible for establishing and
Q53: A computer crime technique called worm involves
Q60: The OE/S process sends the _ notification
Q80: A _ is the least detailed diagram
Q108: In a(n) _ database model, data are
Q119: Knowledge management is the process of capturing,
Q169: A unique identifier that serves as an