Create a three page policy for business continuity

Assignment Help Computer Network Security
Reference no: EM13876052 , Length: 1400 Words

Business Continuity Plan (Word Limit: 1400-1500)

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for action. Address each item in the policy headings below:

The information to use as a resource for your policy is provided below (taken from SunGard Availability Services at www.sungardas.com, limited use for educational purposes) and also in your reading for the week (See Appendix 1 for policy information).

• Plan purpose: for example, to allow company personnel to quickly and effectively restore critical business operations after a disruption.
• Plan objective: for example, to identify the processes or steps involved in resuming normal business operations.
• Plan scope: for example, the work locations or departments addressed.
• Plan scenarios addressed: for example, loss of a primary work area, loss of IT services for a prolonged period of time, loss of workforce, etc.
• Plan assumptions: for example, you may want to call out the number of work locations impacted at any given time that key personnel are available for any recovery efforts, or any assumptions you may have made about vendor or utility service availability.

PLAN SECTION:

Recovery Strategies and Activities

After the initial introductory section, there are usually a number of paragraphs about the strategies outlined in the plan, as well as the specific personnel undertaking the recovery and the recovery activities. Examples of sections that you may want to consider for your own BC/DR plan include:

Recovery Strategy Summary: In this section, a plan will typically outline the broad strategies to be followed in each of the scenarios identified in the plan Introduction section. As an example, if "loss of work area" is identified as a possible failure scenario, a potential recovery strategy could be to relocate to a previously agreed-upon or contracted alternate work location, such as a SunGard work area recovery center.

Recovery Tasks: This section of the plan will usually provide a list of the specific recovery activities and sub-activities that will be required to support each of the strategies outlined in the previous section. For example, if the strategy is to relocate to an alternate work location, the tasks necessary to support that relocation effort could include identifying any equipment needs, providing replacement equipment, re-issuing VPN tokens, declaration of disaster, and so on.

Recovery Personnel: Typically, a BC/DR plan will also identify the specific people involved in the business continuity efforts, for example, naming a team lead and an alternate team lead, as well as the team members associated with any recovery efforts. This section of the plan will also include their contact information, including work phone, cellphone, and email addresses. Obviously, because of any potential changes in personnel, the plan will need to be a "living" document that is updated as personnel/workforce changes are made.

Plan Timeline: Many plans also include a section in the main body that lays out the steps for activating a plan (usually in the form of a flow chart). For example, a typical plan timeline might start from the incident detection, then flow into the activation of the response team, the establishment of an incident command center, and notification of the recovery team, followed by a decision point around whether or not to declare a disaster. A plan timeline may also assign the recovery durations or recovery time objectives required by the business for each activity in the timeline.

Critical Vendors and their RTOs: In this section, a plan may also list the vendors critical to day-to-day operations and recovery strategies, as well as any required recovery time objectives that the vendors must meet in order for the plan to be successful.

Critical Equipment/Resource Requirements: A plan may also detail the quantity requirements for resources that must be in place within specified timeframes after plan activation. Examples of resources listed might include workstations, laptops (both with and without VPN access), phones, conference rooms, etc.

Reference no: EM13876052

Questions Cloud

What is the concept of dual beam cro : What Is the Concept of Dual beam CRO?
The principal-agent problem arises because : The principal-agent problem arises because _____ Buying bonds in a firm that has a high net worth is beneficial to the investor because _____.  Governments regulate financial systems because _____
How would you characterize the approach of the schools : The topic of schooling can take many forms and affect the achievement of our kids today. In 200 words how would you characterize the approach of the schools that you attended as a child and as an adolescent?
Discuss the role of judges in the courtroom workgroup : Discuss the role of judges in the courtroom workgroup
Create a three page policy for business continuity : Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..
Change in position of block : Block C starts from rest and moves downward with a constant acceleration. Knowing that after 12 s the velocity of block A is 456 mm/s, determine
The case where all parties to a transaction : The case where all parties to a transaction or contract do not have the same information is a world of ___ information. The FED can increase the money supply by _____.
Public health policy : Public Health Policy - Health Insurance and Economy, When dealing with public health policy and laws, we need to consider various aspects of the economy. Concepts of efficiency can be utilized when deciding which goods and services should be produ..
Defensive open market operations are used to : Defensive open market operations are used to _____. Because timely information on the price level and economic growth is frequently unavailable, the Fed has adopted a strategy of _____. The primary motivation behind the creation of the Federal Reserv..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain why shared accounts is considered bad practice

In your own words, explain why each of the following is considered bad practice:

  Calculates the hash value

Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's or..

  What is the significance of nevis island

ndra changes banks following her troubles with MBT. At her new bank, Ultimate Security Trust (UST), RSA is used as the cryptographic system.

  Write an information security white paper

Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology

  Describe the secure communication scenarios

Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best..

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  Iterative security management process

List the fundamental questions IT security management tries to address and list and briefly define the four steps in the iterative security management process.

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Ealuate the significance of the internet describe how the

1. analyze the evolution of internet to do this show how it has changed over time.2. evaluate the significance of the

  Improving critical infrastructure cybersecurity

Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

  How do clients receive updates in the absence of wsus

Why might READ WRITE and READ CREATE rights pose a security threat? How do clients receive updates in the absence of WSUS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd