Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Drbcp

21/12/2020 Client: saad24vbs Deadline: 14 Days

Running Head: Case Study--Gap Analysis


Project 1: Security and Technology Issues


Benson S. John


Practical Applications in Cybersecurity Management & Policy


UMUC


31st March, 2019


Introduction


As technology in advancing, so are cybercriminals using sophisticated techniques to exploit vulnerability in information system. Bank Solutions Inc rely on this system for financial transactions and it is therefore very critical to make sure their system is well protected and can survive during a possible cyber attack and their system can continue to operate with limited or unnoticeable downtime. To prepare for the foreseen, High ranking members of the company has contracted a third-party vendor to analyze their Disaster Recovery and Business Continuity plan (DRBCP) and identify operating or regulatory risks and recommend possible mitigation strategy. The vendor has identified the following security gaps and recommended state of the art strategy to protect confidentiality, integrity, and availability (Conducting A Gap Analysis: A Four-Step Template, 2019).


Technology or Security Issues:


· Out dated data center DRBCP. Was last updater in January 2009.


· DRBCPs processing facility have not been verified or tested.


· Recovery Time Objectives and Recovery Point were not identified in the DRBCP.


· The DRBCP distribution lists was not readily available to all plan participants


· Critical plan members have not been trained to use DRBCPs


· Power users should not have modified permission to prevent them from editing the event logs or perform administrative work.


· Four item processing facilities have not yet completed the customization DRBCP exercise (Gap Analysis: A Template for Connecting Potential with Performance, n.d).


· DRBCP and other vital policy and guideline failed to address security incident handling steps.


· The DRBCPs documentation failed to outline specific processing responsibilities for backup facilities


· Backup jobs at one processing facility have routinely failed due to unknown causes


Security Issues


Bank Solutions, Inc is a financial institution that deals with vital customers personal and financial information and it is therefore important to have a reliable and secured data backup. Backing up data on a regular bases will protect against the risk of losing critical information due to system failure, human errors, software or other events. The following security and technology issues were identified


· DRBCP – this is a high-risk issue that needs to be address immediately and failure to resolve will result to an availability of customers information which may impact the bank’s operation or ability to provide services to its customer when needed.


· DRBCP and Incident Response Team – to effectively execute any plan or procedure, the response team should have adequate and detailed knowledge of what needs to be done. All resources should be available to each team member.


· Access Control – permission should only be given to team member based on the need to know or role. For example, power users should have been given write permission to the log file. This is a very big risk with a possibility of modifying log data.


Identify Risks and Challenges


After the gap analysis, it is time to map out the risk with in the bank’s information system to be able to achieving the institution’s security objectives. For Bank Solutions, Inc to be compliance with DRBCP, the following risk and challenges needs to be resolve immediately


· A successful execution of the DRBCP depends on training or knowledge of all team member


· Although the process may expose some causes, if it failed to penetrate deeper enough, the projected resolutions may not resolve or address the actual root cause of the problem.


· As technology is changing so is the bank’s information system and it is therefore possible for the analysis to be inaccurate due to outdate technology as in the case of Bank Solutions, Inc.


· DRBCP test or exercise has not being completed since 2007 – the plan should be tested and verified to make sure it is ready when needed (Recognizing the Gaps in Gap Analysis, n.d).


Apply Risk Identification


The goal of risk identification is to find all possible risks within the Banks’s information system. Experience and technical expertise play a vital role in risk identification including team dynamics and personal contacts. The team participation and face-to-face meeting or interaction is vital in encouraging an open-door communication and trust. In the absence of this, team members may be unwilling to talk about their risk concerns. A risk identification process requires an adequate input from all team member. To effectively identify risk, the following processes should be in place:


· The entire DRBCP team should participate and actively involved.


· Possible risks should be identified by all team members.


· Any possible risk identified should be recorded


· All potential risks identified should be documented and followed up by the head of the team (Risk Identification, 2015).


Define Security Strategy


An DRBCP security strategy is very critical for any institution that focuses on building an effective plan alignes with their business and IT strategy. It provides a provides a direction that team members can understand and follow to archive company’s objectives. The following strategy solution designed to effectively mitigate the risk or issue identified.


· Develop and implement an updated version of DRBCP that clearly defines what needs to be done before and after an incident.


· Define roles and identify team members and key personnel, contacts and third-party that that may be contracted to participate or execute DRBCP.


· All team member should have a vast knowledge of the DRBCP and should copy of the plan readily available.


· Test and verify DRBCP plan- conduct a drill or practiced to make sure the team archives the intended purpose and reinforced personnel awareness and tasks in the event of an actual disaster (Key steps to perform a successful information security gap analysis, n.d).


· Implement Access Control through active directory domain service (AD DS) in Microsoft windows 2012 server to delegate permission and roles.


Related Security Solutions that Consist of People Processes


To implement an effective or successfully DRBCP process, it is important to consider teams. Depending on the individual team member experience and knowledge, a successful execution of the plan or incomplete result will be expected. It is therefore important to put together a knowledgeable team whose expertise covers all the necessary requirement. The plan should consist of the following:


· Management Committee -this can be an executive member who oversee the process and actively involves in the approvals process especially when it comes to budgetary issues, strategic direction and policy considerations


· Disaster Recovery Coordinator – this is an individual from the IT department that manages the overall recovery process in the event of any possible disruption. This team member is responsible for activating the recovery plans among the team, and coordinate those efforts as they progress.


· IT Infrastructure – these areas require an expert and therefore may require a team member who is specialized and involves in the recovery process. These team members will be responsible for identifying strategies and solutions that may be need to restore or recover vital operations in their areas of expertise. For example, an administrator from servers or storage, Networks, and Applications support (Herrera, M., & Long, n.d).


Link Solutions


Each and every solutions and step in executing DRBCP process is vital. The preliminary interviews for recovery allow team member to collaborative understand every aspect of recovery component and critical business processes. The following component are linked together to accomplish a positive outcome:


· Recovery Planning - development, educate, and perform drills to verify disaster recovery plan that includes establishing and maintaining contacts for disaster recovery support systems.


· Recovery operations- verify test facility accessibility and safety and assess all risk, restore operations and establish mitigation measures and finally apply lessons learned


Timeline


The table below shows when each of the security issue should be address within a time frame and task priority. The priority is ranging from 1 through 5; with 5 being the highest priority (Holsberg, n.d).


Security Issues

Required Resources

Timeline for Addressing Issue / Month


Task priority


Out dated DRBCP


Develop newer or update current version focusing on business vision.as stated in the policy


4


5


Access Control


Implement Active Directory Domain Service (AD DS) on current Microsoft Server Operating System to delegate access based on role


Rationale: This will restrict what users can do on the


Resources needed: Specialized system server admin or personnel


4


5


Key Team member not been properly trained to use DRBCP


Continuous education or training and certification


3


4


No job title


Define roles and identify team members and key personnel, contacts and third-party


4


2


DRBCP not verified


Rationale: DRBCP needs to be verified to make issue it meets the expected outcome.


Needed: Conduct DRBCP drill to and verify plan


3


5


Lack of knowledge, education, and training, about computer security


Develop training or certification for all team


Needed: All system admin and team members


6


3


Out dated technology


All server, workstation and application


6


4


DRBCP and other vital policy and guideline failed to address security incident handling steps.


This should be clearly defined in the policy


6


5


The DRBCPs documentation failed to outline specific processing responsibilities for backup facilities.


Team leader and high-ranking member


4


3


Backup jobs at one processing facility have routinely failed due to unknown causes


Verify back system, media or network storage and investigate root cause


4


4


Plans to Mitigate Technology Issues and Next Step


Analysis showed that the information system for Bank Solutions Inc is completely out of date and will therefore need an overall investment in technology and implement the above recommendations. A welled trained and qualified team member needs to be developed with a designated team leader. Due to storage and media failure, invest in virtualization or cloud based stored. This will minimize or eliminate most of the expenses incurred including tape backups, extra server storage. In addition to technology, determine the company’s priorities based on strategy and best Practices, identify and completely fill in the gap with the recommended resolution with in a reasonable time frame (Lohrey, 2017).


References


Conducting A Gap Analysis: A Four-Step Template. (2019, February 05). Retrieved from https://www.clearpointstrategy.com/gap-analysis-template/


Gap Analysis: A Template for Connecting Potential with Performance. (n.d.). Retrieved from https://www.shopify.com/enterprise/gap-analysis


Recognizing the Gaps in Gap Analysis. (n.d.). Retrieved from http://www.rmmagazine.com/2016/10/03/recognizing-the-gaps-in-gap-analysis/


Risk Identification. (2015, April 10). Retrieved from https://www.mitre.org/publications/systems-engineering-guide/acquisition-systems-engineering/risk-management/risk-identification


Key steps to perform a successful information security gap analysis. (n.d.). Retrieved from https://searchsecurity.techtarget.com/tip/Key-steps-to-perform-a-successful-information-security-gap-analysis


Herrera, M., & Long, R. (n.d.). Disaster Recovery Planning: Who Needs A Seat At The Table & Why. Retrieved from https://www.drj.com/articles/online-exclusive/disaster-recovery-planning-who-needs-a-seat-at-the-table-why.html


Holsberg, M. (n.d.). Disaster Recovery, Roles, and Responsibilities. Retrieved from https://www.emergency-response-planning.com/blog/bid/59671/disaster-recovery-roles-and-responsibilities


Lohrey, J. (2017, November 21). Regulatory Gap Analysis. Retrieved from https://smallbusiness.chron.com/regulatory-gap-analysis-80381.html


2


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact

google+twitterfacebook

Copyright © 2019 HomeworkMarket.com

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
Helping Hand
University Coursework Help
Homework Guru
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$145 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$140 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$142 Chat With Writer
Homework Guru

ONLINE

Homework Guru

Hi dear, I am ready to do your homework in a reasonable price and in a timely manner.

$142 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Week 2 application security - Six Minute speech - Anxious students strain college mental health centers - Chan v zacharia 1984 154 clr 178 - Total the capacity of each product in that segment capsim - How beneficial to franchisees is a quality training program - Ninewells hospital orthopaedic outpatients - Kingdom classification worksheet answers key - Chapter 21 accounting for leases solutions - Bsbwor501 assessment 2 answers - In the womb national geographic answers - Jeff bliss duncanville today - Care Plan - High five reading strategy - National communication association credo for ethical communication - Harriet tubman conductor on the underground railroad book - Donate bras uk freepost - Math Assignment - Non luminous flame bunsen burner - What was humpty dumpty's cause of death geometry - Identify the subordinate clause - The Significance of Effective Sales Force - An artificial lake is in the shape of a rectangle - Kent state stark majors - 2336 pounds to kg - What is a teaching philosophy statement samples - Solutions to exercises in introduction to logic irving copi - Amb value trust fund price - Unit 2 DB: Technology and the World (CIS112) - Molly in private peaceful - 6103 Week 6 - Assignment: Treatment Approach - LeaderAsChangeAgent_Assessment5 - Bilingualism in america hayakawa answers - Raymarine s100 remote control - Engineering drawing geometric construction - Asss - Simnet office 2016 integrated applications project 3 - Need today - What is a satchel of richards meaning - Chelsea fc disabled contact - Models of grieving - Opposite word of detective - Youth living away from home allowance - V - Human brain clay model - C12 Case Analysis 2 - United States v. Hansen - Essay question - William duke of normandy strengths - ENGLISH FOR ACADEMIC AND PROFESSIONAL PURPOSES - US GAAP / IFRS Report (with research tracker) - Prepare a balance sheet as of december - Explain various philosophies of marketing - Reflection of a bollywood film and 2 readings - Uwa second hand bookshop - REPLY 1 422 apa - Uncle pudgy's pizza west seneca menu - Whitechapel club devil in the white city - Post means before or after - How does udp verify datagram integrity - Gettysburg address famous quotes - How long to speak 1200 words - What is 4u maths - Dr sue ellen silburn - My cafe watson hypnosis answer - Help with assignment - Under armour turnaround strategy in - 6 historical lenses - Telstra mobile broadband plan - Explain the evolutionary relationship between the fin of a fish - Where is lucy skeleton kept - Economic - Six dimentions of health - Critical appraisal assignment examples - Business management - From a leadership perspective what is jim doing wrong - Microbiology case study examples with answers - Oxidation state of pt in pt c2h4 cl3 - Microeconomics case study supply and demand - Reality therapy and self evaluation the key to client change - Failed to establish a backside connection in datapower - Song of myself questions and answers - Omnipotent and symbolic view of management - Minitab data labels decimal places - 2 part assignment - Max's maximum case study - Tom murphy do the math - Carinya classic awning frame - Go go go said the bird - Movielens case study using python - Leadership - Positive Impacts of Emotional Support Animals - Nursing diagnosis for pancreatitis - Rocky bay medication training - Chemical reaction between khp and naoh - Calculating energy content of foods with a calorimeter lab answers - Business model template download - 5.53 km in miles - Managerial Accounting_Discussion_6 - Gibbs reflective cycle example - Aqa computer science 2020