Business continuity plan for review

Assignment Help Other Subject
Reference no: EM133163331 , Length: word count:2750

Essay Assignment

Assignment - Submit the Business Continuity Plan for Review

Instructions

To help ease the concerns of the CISO and other executive officials tied into cyber operations, the chief technology officer (CTO) is asking for processes and procedures regarding exposed systems. You created a security baseline of your nation team's systems in Project 1, and that is a necessary part of determining mission priorities and identifying critical systems in the event of a cyber incident. You've also completed several steps that will provide an assessment of the software life cycle and development, including a development matrix. Now, as a team, and in accordance with your team agreement, you will create an eight- to 10-page Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole enterprise after a cyberattack event. This BCP will be used to help the CISO identify current systems and timelines that will be used to bring systems back online and the sequence of events that occur during deployment of the plan. Make sure that all citations are in proper APA format.

Refer to the following documents to assist you in creating the final portion of the BCP:

Your team's security baseline from Project 1

Contingency Planning Guide for Federal Information Systems for examples of what to include in your BCP

Best Practices for Creating a BCP

Consider and include the following as you develop your BCP:

The BCP should include the software development life cycle assessment and the software development matrix you completed in prior steps.
The BCP should describe the normal operation standards, practices, and procedures for operating systems, including critical systems. Develop standard operating procedures based on what the team identifies as the most critical to least critical to continue business operations. Included in the standard operating procedures and best security engineering practices should be operating system fundamentals, operating system security, management of patches, and operating system protections.

All partner nations at the summit have maintained that there will possibly be the use of an ad hoc wireless network. The nations' CISOs will have to determine differences between rogue and authorized access points with consideration to authorized service set identifiers (SSID). These considerations will have to be included in the BCP.

Limit the scope to communications systems.
The BCP should be tailored to recover from a ransomware attack. Include leadership decision-making options for payouts in such currencies as Bitcoin, which uses blockchain technology. Based on the recent outbreaks of ransomware attacks, identify key components of the given topology and describe how a ransomware incident would be contained or identified if an event occurred inside the given topology. What are the network security threats for a ransomware attack? Include these vectors as scenarios in the BCP and address remediation paths.

The BCP should also include an incident response plan, IR response flow for DDoS, malware, insider threats-in case of a need to execute the plan, documentation will be used for identified parties to follow to ensure proper communication channels and flow of information/triggers are understood so breakdown does not occur.

Sources: 5 sources required; Citation Style: APA 7th edition

10 pages / 2750 words (Double spacing)

Reference no: EM133163331

Questions Cloud

PSY002-2 Biological and cognitive Psychology Assignment : PSY002-2 Biological and cognitive Psychology Assignment Help and Solution, University of Bedfordshire - Assessment Writing Service
State a hypothesis for the happiness and engagement : State a hypothesis for the Happiness and Engagement Dataset from Part 1 of the Statistics Project - Review the steps beginning on p. 202 in Statistics Plain
Describe methodologies used while conducting research : Describe methodologies used while conducting research - You will summarize contents of books, articles, laws and/or regulations that have direct relevance
MGMT 441 Strategic Management Assignment : MGMT 441 Strategic Management Assignment Help and Solution, Southern Illinois University - Assessment Writing Service
Business continuity plan for review : Business Continuity Plan for Review - identify current systems and timelines that will be used to bring systems back online and the sequence of events
Investigate the existing network protocols : Researching techniques attackers use to infiltrate a network such as denial of service, backdoor, botnet, and brute-force attacks
Cultural issue between employees : Discuss the methodologies the organization will use to resolve any issues regarding employment laws and policies internally
Literature review paper project : Research paper - Introduce the necessary background information for the context of your argument - Using these tools may take a little time in the beginning
Evaluate the impact of organisation culture : Evaluate the impact of organisation culture, politics, stake-holder influence, social responsibility and ethical issues on corporate strategy assessment

Reviews

Write a Review

Other Subject Questions & Answers

  What is the role of writing and other communication

What is the role of writing and other communication and how are they valued in the career, especially by managers and other leaders?

  How do the differences affect prisoners rights

In your opinion, how do these differences affect prisoners' rights? Explain which type of correctional facility is more effective, private or state run.

  Describe accountability tools and procedures

Explain the accountability of the nurse leader for decisions that affect health care delivery and patient outcomes. Describe accountability tools and procedures

  How are rhyme and other metrical devices used in the poem

How are rhyme and other metrical devices used in the poem. Do they support the poem's overall meaning. Why or why not

  LEG 100 Business Law Assignment

LEG 100 Business Law Assignment Help and Solution - Strayer University, USA - Homework Help - What types of legal claims could Paula make

  Discuss how would you describe or define religion

What is religion? Do not look up an "official" definition. From your experience and observations, how would you describe or define religion

  Explain the two major types of bias

Explain the two major types of bias. Identify a peer-reviewed epidemiology article that discusses potential issues with bias as a limitation and discuss.

  Social and mobile web technologies influences

Describe how Interaction Design in social and mobile Web technologies influences a user to seek information or purchase products online?

  Describe the continuous spectrum of blackbody radiation

Discuss/describe the continuous spectrum of blackbody radiation given off by the item.

  How will apply what learned to patient care

Explain What did you learn from this course that you did not already know? How will you apply what you learned to your patient care?

  Discuss the social and cultural norms

Discuss the social and cultural norms of your vulnerable population and how these play a role in the need for the services offered

  The amount of time spent shopping

The scenarios below are possible results of a study in which participants completed a measure of how important religion was to them personally. Participants are either from a Rural or Urban area, and are either Poor or Rich.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd