Case study on incident response and business continuity

Assignment Help Other Subject
Reference no: EM132012028 , Length: word count:1500

Information Security Management & Compliance

Case Study on Incident Response & Business Continuity

THE ASSIGNMENT TASK:

This is an individual assessment. Case Study

ISMC Ltd is involved in designing hundreds of small electronic products. These carry a minimal intellectual property value as there are hundreds of other companies in this field designing similar products.

Over the last 3 years, the company has been exploring the South American markets and is about to bid for a highly ambitious contract which will have a huge impact on the organisation. The contract is for the Colombian government to design different cutting edge electronic products for the Colombian secret services.

Up to now there has been little or no consideration of Information Security, however this will need to change significantly. Amongst the various presentations and reports that ISMC Ltd will have to make in the bidding process, there is a specific requirement by the contract awarding body that the bidders demonstrate a highly effective and sound approach towards information security. This will be demonstrated by ISMC Ltd through a report to the contract awarding body.

You have been assigned by your company to review the current situation at the company, respond and prepare the initial Incident Response and Business Continuity report.

You had a meeting with the IT director who provided you with the following information in relation to the Incident Response and Business Continuity situation in ISMC Ltd.

She informed you there was an attempt a year ago to draft an Incident Response and Business Continuity policy, but it was difficult to identify a member of staff or department that should be responsible for developing and maintaining it. In fact, the IT department suggested the HR department is responsible for developing the policy, while the HR department supported they don't have the technical background to write such a policy. Therefore, the policy was never implemented.

However, she reassured you for the following items:
- All corporate servers are backed up at least once a month onto external portable hard drive systems.
- Requirements are being set for data storage to be outsourced on the cloud abroad as a more efficient and cost-effective way to backup data.
- It is the responsibility of the employees to ensure that they backup data regularly.
- Staff training sessions were used to inform employees of the requirement to backup data and the consequences of losing data
- Based on the current practice data can be backed up in
- Staff local machine hard disks
- External drives
- Company's central storage system

Task
You are required to produce a report which identifies the technical problems relating to the current situation, which also highlights the best practise in relation to Incident Response and Business Continuity.

You should identify 3 priority security risks in relation to the current practise; discuss the threat by providing an adequate background to each of the risks and then a solution. The background should be your interpretation of the problem.

You should also research on Incident Response and Business Continuity (technical, practise, policies, procedures, standards) for you to be able to expand on the topic and recommend the good practise for ISMC Ltd.

Your report should be professionally formatted and approximately 1500 words.

MODULE LEARNING OUTCOMES ASSESSED BY THIS ASSIGNMENT:

1. Advanced current concepts and issues of information environment risks, vulnerabilities and threats

2. Managing an information environment in terms of deterrence, detection, protection and reaction to access

3. A systematic application of the tools, methods and procedures (theoretical and methodological) used within the cyber security arena under the context of a risk and threat assessment

4. Critically demonstrate self-direction and creativity in managing the security of an information environment at the strategic, tactical and operational levels, effectively developing information security policies.

5. Use initiative to autonomously conduct and manage a risk assessment of a complex and unpredictable environment

6. Demonstrating a systematic approach of creatively applying security standards to unfamiliar contexts for solving problems

Reference no: EM132012028

Questions Cloud

What was the correlation coefficient : In a study of how late people are to work, 73% of the variability of the amount of time late could be accounted for by the time spent in traffic jams.
Create simple models for finding the ytm of bond : Create simple models for finding the YTM of a bond, then perform several sensitivity analyses.
What is the future of enterprising : An undergraduate psychology degree provides you with some flexibility when selecting a career. The knowledge of how people think, develop, and behave.
Number of annuity payments : Joey realizes that he has charged too much on his credit card and has racked up $4,900 in debt. how long will it take him to pay off the debt?
Case study on incident response and business continuity : 7COM1066 - Information Security Management & Compliance - University of Hertfordshire - Case Study on Incident Response & Business Continuity
What is the probability that all 6 orders arrive : What is the probability that all 6 orders arrive within this commitment period?
Assuming that speculative premium : Assuming that the speculative premium remains $3.50 over the intrinsic value, how far would price of stock have to fall from $80 before warrant has no value.
What are the strengths and limitations of the theories : How could Brandi's behavior be explained using social learning theory? What are the strengths and limitations of these two theories as applied to this example?
Distribution important in statistical analysis : What is meant by the term "Normal Distribution". Is the normal distribution important in statistical analysis

Reviews

len2012028

6/8/2018 2:07:39 AM

Format, presentation, style, punctuation, spelling and grammar Unclear structure to report. Many spelling mistakes in each paragraph. Writing style unclear. Some structure to report. Most text has a clear message. Numerous spelling mistakes. Basic sentence construction rules followed. Some text may be verbose. Clear structure to report. Few spelling mistakes. Sentences of appropriate length and punctuation used correctly. Well-written report, showing good skills in creativity and good design. Sentences of appropriate length. Brief but informative writing style. Well-formulated structure to report. No spelling mistakes. Very clear sentences that make good use of punctuation. Writing style clear and informative without being verbose.

len2012028

6/8/2018 2:07:34 AM

Relevance of discussion, Logical organisation of thoughts and arguments; brevity, clarity, and understanding. Little originality. Student has failed to get to grips with the subject. Inadequate discussion Does not show full understanding of what is required. Arguments reasonably clear but underdeveloped. Student has demonstrated an adequate understanding. May contain some errors. The student has demonstrated a clear understanding of the problem area. A theme is present, but underdeveloped. A clear and useful theme is developed. Insight into implications. Clear and concise arguments. Contains very few errors. Excellent understanding and exposition of relevant issues that shows insight and draws together the chosen subject key features into a theme, no errors. Critical thinking.

len2012028

6/8/2018 2:07:28 AM

Criteria Fail (< 50) Pass (50 – 59) Reasonable (60 – 69) Good (70 – 79) Excellent (80 +) Introduction and brief outline of the key issues identified. Superficial. Little insight shown in selection of material. Covers few/none of key subject issues. Reasonable evidence of some insight into the subject area. All the material is appropriate. The student has covered most subject areas. Report demonstrates a good understanding of the subject area covering all key issues. Contains very few errors. High academic learning ability achieved. Exceptional quality of output showing creative and innovative flair

len2012028

6/8/2018 2:07:11 AM

1 This assignment is worth 100% of the overall assessment for this module. 2 You are expected to spend about 40 Hours to complete this assignment to a satisfactory standard 3 Date assignment set Date completed assignment to be handed in 4 Target date for return of marked assignment

len2012028

6/8/2018 2:06:59 AM

1. Advanced current concepts and issues of information environment risks, vulnerabilities and threats 2. Managing an information environment in terms of deterrence, detection, protection and reaction to access 3. A systematic application of the tools, methods and procedures (theoretical and methodological) used within the cyber security arena under the context of a risk and threat assessment 4. Critically demonstrate self-direction and creativity in managing the security of an information environment at the strategic, tactical and operational levels, effectively developing information security policies. 5. Use initiative to autonomously conduct and manage a risk assessment of a complex and unpredictable environment 6. Demonstrating a systematic approach of creatively applying security standards to unfamiliar contexts for solving problems

len2012028

6/8/2018 2:06:50 AM

This sheet must be submitted with the assignment, signed and either BOX A or B filled in. LATE SUBMISSION WILL ATTRACT A STANDARD LATENESS PENALTY. 1. For undergraduate modules, a score of 40% or above represents a pass mark. 2. For postgraduate modules, a score of 50% or above represents a pass mark. 3. For work submitted up to 5 working days late marked is capped to a bare pass (40% for undergraduate and 50% for postgraduate). 4. For work submitted more than 5 working days a mark of zero will be awarded for the assignment.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd