Reference no: EM132559287 , Length: word count:1050
Assignment 1:
Identifying physical security threats and creating a contingency plan
In this assignment, you will outline an Information System Contingency Plan (ISCP).
NIST issued a revised guidance, 800-34 (2010), which defines a seven-step contingency planning process that federal agencies and other organisations in fields such as healthcare and banking can use to develop and maintain a viable interim recovery program for their information systems. This process involves seven (7) steps:
1. Develop the contingency planning policy.
2. Conduct the business impact analysis (BIA).
3. Identify preventive controls.
4. Create contingency strategies.
5. Develop an Information System Contingency Plan.
6. Ensure plan testing, training, and exercises.
7. Ensure plan maintenance.
Requirement
Create an initial post in which you do the following:
In 500-750 words, create a sentence outline of an Information System Contingency Plan (ISCP) for your organisation or an organisation you are familiar with, based on the seven steps listed above and described in the NIST 800-34 directive. Your sentence outline should briefly describe each topic of the ISCP. Each sentence, instead of simply identifying the ISCP topic, should be a brief statement about that topic. Each sentence should express the idea that that section of the plan will cover as part of describing the overall ISCP. The final ISCP outline will be uploaded into the student's portfolio.
Assignment 2:
Predicting the future of Cyber SRM and the impacts of new technologies
What is the future of cyber SRM going to look like?
Cyber threats today are dynamic, and attack vectors are constantly changing, adopting new technologies and exploiting new fields of vulnerabilities, creating an ever-evolving threat landscape.
New frontiers of cyber threats are opening up due to evolving technologies and new sophistication and trends.
To prepare for this Assignment:
Consider Emerging Risks in Cybersecurity: Gartner's Top Ten Predictions (Wheeler, 2016). Based on the report, we will see a variety of attacks over the next few years as well as progress in the technologies and processes which prevent them. Our predictions focus on how organisations can prepare for future cyber security risks while taking appropriate action today.
Requirement
Create an initial post in which you do the following:
Submit a paper (approx. 500 words) in which you identify emerging domains, include information such as expected timelines for major worldwide adoption, identify the impact on cyber security and supporting standards and describe the underlying technologies of these domains. Make appropriate SRM considerations based on these guidelines.
Attachment:- Contingency plan.rar