Create a three page policy for business continuity

Assignment Help Computer Network Security
Reference no: EM13876052 , Length: 1400 Words

Business Continuity Plan (Word Limit: 1400-1500)

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for action. Address each item in the policy headings below:

The information to use as a resource for your policy is provided below (taken from SunGard Availability Services at www.sungardas.com, limited use for educational purposes) and also in your reading for the week (See Appendix 1 for policy information).

• Plan purpose: for example, to allow company personnel to quickly and effectively restore critical business operations after a disruption.
• Plan objective: for example, to identify the processes or steps involved in resuming normal business operations.
• Plan scope: for example, the work locations or departments addressed.
• Plan scenarios addressed: for example, loss of a primary work area, loss of IT services for a prolonged period of time, loss of workforce, etc.
• Plan assumptions: for example, you may want to call out the number of work locations impacted at any given time that key personnel are available for any recovery efforts, or any assumptions you may have made about vendor or utility service availability.

PLAN SECTION:

Recovery Strategies and Activities

After the initial introductory section, there are usually a number of paragraphs about the strategies outlined in the plan, as well as the specific personnel undertaking the recovery and the recovery activities. Examples of sections that you may want to consider for your own BC/DR plan include:

Recovery Strategy Summary: In this section, a plan will typically outline the broad strategies to be followed in each of the scenarios identified in the plan Introduction section. As an example, if "loss of work area" is identified as a possible failure scenario, a potential recovery strategy could be to relocate to a previously agreed-upon or contracted alternate work location, such as a SunGard work area recovery center.

Recovery Tasks: This section of the plan will usually provide a list of the specific recovery activities and sub-activities that will be required to support each of the strategies outlined in the previous section. For example, if the strategy is to relocate to an alternate work location, the tasks necessary to support that relocation effort could include identifying any equipment needs, providing replacement equipment, re-issuing VPN tokens, declaration of disaster, and so on.

Recovery Personnel: Typically, a BC/DR plan will also identify the specific people involved in the business continuity efforts, for example, naming a team lead and an alternate team lead, as well as the team members associated with any recovery efforts. This section of the plan will also include their contact information, including work phone, cellphone, and email addresses. Obviously, because of any potential changes in personnel, the plan will need to be a "living" document that is updated as personnel/workforce changes are made.

Plan Timeline: Many plans also include a section in the main body that lays out the steps for activating a plan (usually in the form of a flow chart). For example, a typical plan timeline might start from the incident detection, then flow into the activation of the response team, the establishment of an incident command center, and notification of the recovery team, followed by a decision point around whether or not to declare a disaster. A plan timeline may also assign the recovery durations or recovery time objectives required by the business for each activity in the timeline.

Critical Vendors and their RTOs: In this section, a plan may also list the vendors critical to day-to-day operations and recovery strategies, as well as any required recovery time objectives that the vendors must meet in order for the plan to be successful.

Critical Equipment/Resource Requirements: A plan may also detail the quantity requirements for resources that must be in place within specified timeframes after plan activation. Examples of resources listed might include workstations, laptops (both with and without VPN access), phones, conference rooms, etc.

Reference no: EM13876052

Questions Cloud

What is the concept of dual beam cro : What Is the Concept of Dual beam CRO?
The principal-agent problem arises because : The principal-agent problem arises because _____ Buying bonds in a firm that has a high net worth is beneficial to the investor because _____.  Governments regulate financial systems because _____
How would you characterize the approach of the schools : The topic of schooling can take many forms and affect the achievement of our kids today. In 200 words how would you characterize the approach of the schools that you attended as a child and as an adolescent?
Discuss the role of judges in the courtroom workgroup : Discuss the role of judges in the courtroom workgroup
Create a three page policy for business continuity : Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..
Change in position of block : Block C starts from rest and moves downward with a constant acceleration. Knowing that after 12 s the velocity of block A is 456 mm/s, determine
The case where all parties to a transaction : The case where all parties to a transaction or contract do not have the same information is a world of ___ information. The FED can increase the money supply by _____.
Public health policy : Public Health Policy - Health Insurance and Economy, When dealing with public health policy and laws, we need to consider various aspects of the economy. Concepts of efficiency can be utilized when deciding which goods and services should be produ..
Defensive open market operations are used to : Defensive open market operations are used to _____. Because timely information on the price level and economic growth is frequently unavailable, the Fed has adopted a strategy of _____. The primary motivation behind the creation of the Federal Reserv..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  Explain the security mechanisms available for a database

this assignment requires the use of a relational database management system. strayer university provides each student

  Personal and business-related cybersecurity scenarios

Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios - Describe the mission of each, and examine and compare details of each stated privacy policy.

  Case study - personal computer security threats

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Describe any risks or threats mitigated by using firewall

Install an application-based firewall on a personal workstation. In one paragraph, describe the name and version of the firewall installed and its core features. In a second paragraph, describe any risks or threats mitigated by using this firewall..

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  Security mechanisms needed to protect the dms systems

Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  The discussion board is part of the core of online

the discussion board is part of the core of online learning. classroom discussion in an online environment requires

  Identify the vulnerabilities and threats to the organization

Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen

  How their software is in fact not high assurance software

How would you explain to this company how their software is in fact not high assurance" software?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd