Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Bcp drp bia

04/01/2021 Client: saad24vbs Deadline: 3 days

ISOL 533 - Information Security and Risk Management University of the Cumberlands


NOTE: BEFORE TURNING THIS IN, REMOVE THE HIGHLIGHTED TEXT.


Task 1. Complete the BIA table below and use it for the remainder of the assignment. You may want to review your Lab #07 assignment where you developed a BIA table. Information needed to create the Business Functions and Processes below are in the “Project Management Plan” scenario and the “Project Health Network Visual”. Hint: look at the processes that go from the customers and into the systems/applications in the “Project Health Network Visual”.


Business Function or Process


Business Impact Factor


Recovery Time Objective


IT Systems/Apps Infrastructure Impacts



Task 1: Business Impact Analysis – extracts from the Boiler Plate


1. Overview


This Business Impact Analysis (BIA) is developed as part of the contingency planning process for the HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system. It was prepared for Health Network, Inc (Health Network).


2. System Description


<In this section, provide a general description of the system architecture (hardware, software, databases, etc) and functionality as provided in the scenario and visual. Indicate the operating environment (i.e. Data Center, etc), physical location, general location of users, and partnerships with external organizations/systems. Include information regarding any other technical considerations that are important for recovery purposes, such as backup procedures or the lack of backup procedures.>


3.1.1 Identify Outage Impacts and Estimated Downtime


Estimated Downtime


The table below identifies the MTD, RTO, and RPO for the organizational business processes that rely on the HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system.


<Complete the tables below for each system using the RTO from your BIA table and estimating the MTD and RPO based on any drivers that might determine their values (e.g., mandate, workload, performance measure, etc.).>


Mission/Business Process


For HNetExchange


MTD


RTO


RPO


Mission/Business Process


For HNetConnect


MTD


RTO


RPO


Mission/Business Process


For HNetPay


MTD


RTO


RPO


Task 2: Business Continuity Plan – extracts from the Boiler Plate


<After discussions with management, the organization implemented the following Back-up Plan: all database files are backed-up to tape at the end of the day. These tapes are then stored offsite. The HNetPay data is backed-up daily and retained for 6 months. The HNetMessage messages are backed-up daily and retained for 3 months. All other data is backed-up weekly and retained for 60 days. If the BCP is executed, the most current tapes are copied and mailed to the alternate site.


Modify the statements below to reflect this decision. FAILURE TO MODIFY THIS SECTION WILL RESULT IN DEDUCTED POINTS!!!!>


Emergency management standards

Data backup policy


Full and incremental backups preserve corporate information assets and should be performed on a regular basis for audit logs and files that are irreplaceable, have a high replacement cost, or are considered critical. Backup media should be stored in a secure, geographically separate location from the original and isolated from environmental hazards.


Department-specific data and document retention policies specify what records must be retained and for how long. All organizations are accountable for carrying out the provisions of the instruction for records in their organization.


IT follows these standards for its data backup and archiving:


Tape retention policy


Backup media is stored at locations that are secure, isolated from environmental hazards, and geographically separate from the location housing the system.


Billing tapes


· Tapes greater than three years old are destroyed every six months.


· Tapes less than three years old must be stored locally off-site.


· The system supervisor is responsible for the transition cycle of tapes.


System image tapes


· A copy of the most current image files must be made at least once per week.


· This backup must be stored offsite.


· The system supervisor is responsible for this activity.


Off-site storage procedures


· Tapes and disks, and other suitable media are stored in environmentally secure facilities.


· Tape or disk rotation occurs on a regular schedule coordinated with the storage vendor.


Access to backup databases and other data is tested annually



Task 3: Disaster Recovery Plan – extracts from the Boiler Plate


<There are 3 Systems Identified in the “Project Risk Management Plan”. For this assignment, fill out the following Appendixes for each SYSTEM. Complete all areas below that are highlighted.>

Disaster Recovery Plan for <HNetPay>

OVERVIEW

PRODUCTION SERVER

Location: Enter location


IT INFRASTRUCTURE

Provide details on what systems, applications, databases and equipment are involved.


BACKUP STRATEGY FOR SYSTEM ONE

Daily / Monthly / Quarterly

Choose which strategy on the left is use.


< For each Risk below, 1. Explain how the risk impacts the critical IT Infrastructure, 2. Explain how the Loss impacts the company, and 3. Explain the steps needed to resolve the problem>


DISASTER RECOVERY PROCEDURE

Risk #1: Loss of company data due to HNetPay hardware removed from production systems.

Provide details


Risk #2: Loss of customers due to production outages.

Provide details



Disaster Recovery Plan for <HNetConnect>

OVERVIEW

PRODUCTION SERVER

Location: Enter location


IT INFRASTRUCTURE

Provide details on what systems, applications, databases and equipment are involved.


BACKUP STRATEGY FOR SYSTEM ONE

Daily / Monthly / Quarterly

Choose which strategy on the left is use.


< For each Risk below, 1. Explain how the risk impacts the critical IT Infrastructure, 2. Explain how the Loss impacts the company, and 3. Explain the steps needed to resolve the problem>


DISASTER RECOVERY PROCEDURE

Risk #1: Loss of company data due to HNetConnect hardware removed from production systems.

Provide details


Risk #2: Loss of customers due to production outages.

Provide details


Disaster Recovery Plan for <HNetExchange>

OVERVIEW

PRODUCTION SERVER

Location: Enter location


IT INFRASTRUCTURE

Provide details on what systems, applications, databases and equipment are involved.


BACKUP STRATEGY FOR SYSTEM ONE

Daily / Monthly / Quarterly

Choose which strategy on the left is use.


< For each Risk below, 1. Explain how the risk impacts the critical IT Infrastructure, 2. Explain how the Loss impacts the company, and 3. Explain the steps needed to resolve the problem>


SYSTEM DISASTER RECOVERY PROCEDURE

Risk #1: Loss of company data due to HNetExchange hardware removed from production systems.

Provide details


Risk #2: Loss of customers due to production outages.

Provide details



Task 4: Computer Incident Response Team Plan – extracts from the Boiler Plate


<There are 6 Threats Identified in the “Project Risk Management Plan”. For this assignment, assume the following Threat exploited a Vulnerability:

· Loss of company information on lost company-owned laptop


Complete all HIGHLIGHTED areas below. >

Appendix A – Incident Response Worksheet


Preparation :


What tools, applications, laptops, and communication devices were needed to address the Computer Incident Response for this specific breach?


Identification : When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed:


· Identify the nature of the incident


· What Business Process was impacted


· What threat was identified


· What weakness was identified


· What risk was identified


· What was the Risk Factor/Impact of the incident


· What was the RTO, MTD and RPO assigned to the business process


· What hardware, software, database and other resource were impacted


Containment : The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.


· What needs to be done to limit the scope of the incident


Eradication : The next priority is to remove the computer/security-related incident or breach’s effects.


· What needs to be done to mitigate the risk of the incident


Recovery : Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.


· What needs to be done to recover the IT systems


· What procedures need to be used and are they covered in the Disaster Recovery Plan


· Would the Business Continuity Plan be executed in response to this incident


· Would any issues be identified that would lead to updates to the BIA, BCP or DR plans.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$105 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$100 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Consonance examples in poetry - 501 syntax error in parameters or arguments to rcpt command - A7 8k l4 5p sequence answer - C wright mills intersection of biography and history - 67 falie drive north haven - Ed eats a slide - Acid base titration lab vernier answers - Limiting reagent lab baking soda vinegar answers - Fin 571 week 3 individual assignment - Hive receiver wiring diagram - Centrelink total net investment losses - Ruled vs holographic grating - Basic Statistics and Process Map - Prod & Opertions - Onboarding strategies to supercharge millennial employees - Top 5, Thread 1 and 2 - E.2 - Warrior task and battle drills level 2 - How to differentiate a log - Bolman and deal reframing organizations - Help me with Spanish please - Rd gateway ssl bridging - Peanut butter bar revesby - Icd 9 code for lumbar fusion surgery - A hellish undertaking dragon ball fusions - Capstone Project Change Proposal Presentation - Bluetooth can be used to create a _____, to communicate among computerized devices. - Speech Outline - Evaluation question - Devry econ 312 week 3 quiz - Sdlc explained with example - The least squares regression line minimizes the sum of the - Cadbury gorilla ad song - Iqms wiki is tcs organizational standard process repository - Just a dream chris van allsburg activities - Discussion and 2 replies - Microbes - Discussion 3 - - Chapter 14 summary to kill a mockingbird - Dis 8 - The strategic national risk assessment snra - Annual Report - Need monday - Chinese cinderella chapter 11 summary - This historic route is 2170 miles long - Forklift licence victoria handbook - Castle house island dublin ireland wikipedia - Quotes from tomorrow when the war began - Conbraco rpz test points - Meal planning for lipids - Is mrsa communicable or noncommunicable - Week one discussion fund of data systems - Georgetown district high school - Simpsons lord of the flies - Importance of tessellations in life - Sustainable talent management - Create a VERY BASIC conference room scheduler PHP web application. - Which css property configures the font typeface - What is an ethnic enclave answers - PowerPoint - Excel chapter 2 grader project - Timmco Case Study - Chapter 8 chapter 8 - What are two theories of city land use - 3-4 paragraphs Cohesive response for Business - Chcprt001 forum - Mexico and the Cartels/Canada - Which type of variance causes operating income to be greater than the budgeted operating income? - Websense security override blocked - Criminal law and procedure 8th edition scheb pdf - How to write a tv show analysis - Walden nurs 6630 midterm exam - Merlin home transmitter wireless setup - Strengths and weaknesses of rc4 - Create your own climograph answers - Week 6 - Isaac physics pre university answers - Vcaa chinese first language - Which type of marketing research is focused on domestic operations - The slope of a distance time graph indicates - Dayton vineyard church - Chocolate lovers unite a role playing simulation on web analytics - Induction training record template - Electromagnetic spectrum lab report - Reflection examples nursing revalidation - Ionic lewis dot diagram - Week 7 Discussion NURSING LEADERSHIP AND MANAGEMENT - +91-8306951337 get your love back by vashikaran IN Ujjain - Rosalie gascoigne metropolis 1999 - Integral of secx tanx dx - Assume the following information about the market and jumpmasters stock - Moreton bay council dog registration - Research paper - Ben and jerry's homemade case study solution - Zn no2 2 name - Bachelor of social work utas - Worksheet 11.9 subjunctive mood after verbs of emotion - Performance management at vitality health enterprises inc - As3000 current carrying capacity - Research Paper - Bbc magnets and springs