Bus Cont Plan&Disas Recov Plan 13

 A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure? 

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

350 -400 words .

Chapter 19: information security response

Security plans

Physical security

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Logical security

Encryption

Proper disposal of assets

Policies and training to guide employees

What to protect
Information security protects three aspects of data systems – CIA
Confidentiality – only authorized access is permitted
Integrity – protect against unauthorized alteration
Availability – data systems and data are available
Ways to improve Availability: UPS, RAID, Clustering critical servers, install failover capability

Information security risks

Threats

Vulnerabilities

controls

threats

Malicious hackers

Bored students

Unhappy employees

Helpful employees

Thieves

Lazy engineers

Hardware failure

vulnerabilities

A Threat that exploits to attach your company

Gap in protection methods

Scan regularly for vulnerabilities

controls

Preventative actions taken to stop an attack

Warning sensors

Technical solutions

Administrative actions to reduce vulnerabilities

Physical security

Fence around company’s buildings

Locked doors

Locked door on data center

Technical security

User ID and passwords

Access control list (ACL)

Controls on routers and wireless access points

Change default passwords

Lock down equipment

Data security
Types of Data:
Personally identifiable information (PII)
Student records
Medical records
Credit card or check numbers

Data security – cont’d
Protect Data:
Encrypt all portable data
Incoming and outgoing data much be encrypted using a company-approved standard
Disable USB ports
All devices mush be physically destroyed
Company documents shredded
Implement a clean desk policy
Screen saver time-out and password protected

Social engineering
Phone call from someone claiming to be Help Desk asking for ID information
Official-looking person claiming to be repairman
Hacker who search online social media looking for IT people at certain company
Person walking behind an employee towards a security door
Caller pretending to be vendor
Person quietly watching over someone’s shoulder
Dumpster diver

Incident management
Details the initial action steps necessary to:
Stop the intrusion
Contain the damage
Gather evidence as to the source
Objectives
Actual impact

Plan contents

Confirm the incident is not a false positive

Activate the response team

Open the telephone bridge

Assess the situation

Incident management team checks rest of IT systems for potential break-ins

Incident after-action review

Conduct a review within a few days of incident

Format for review questions:

What happened?

What should have happened?

What went well?

What did not go well?

What will be done differently next time?

Testing the response plan

Test the plan with the team regularly

Testing updates to the procedures

Testing for new team members

Testing may help to determine false-positives

Preserving forensic evidence
Types of evidence to collect:
Photographs
Time difference on each device
Hash of every data set
System log files

Establishing policies

Typical policies include:

Incident response

Acceptable use

Acceptable use policy should address:

Social engineering

Password management

User ID

Data policy

Patching policy

Educating employees

Employees are the number-one security threat

Essential that all employees are trained

Users should understand the importance of proper data disposal

Ongoing user awareness program

Verify training through exams

summary

Information security is an important part of the BCP

Information security requires constant vigilance to prevent criminal activity

Incident response planning must be completed before it is needed

.MsftOfcThm_Accent1_Fill {
fill:#4472C4;
}
.MsftOfcThm_Accent1_Stroke {
stroke:#4472C4;
}

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP