Now, as a team, and in accordance with your team agreement, you will create

Question # 00586734
Subject: Computer Science
Due on: 01/08/2018
Posted On: 02/15/2018 04:59 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

Now, as a team, and in accordance with your team agreement, you will create an eight- to 10-page Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole enterprise in the face of a cyberattack event. This BCP will be used to help the CISO identify current systems and timelines that will be used to bring systems back online and the sequence of events that occur during BCP operations. Make sure that all citations are in proper APA format.

Refer to the following documents to assist you in creating the final portion of the BCP:
  • Contingency Planning Guide for Federal Information Systems for examples of what to include in your BCP

  • Best Practices for Creating a BCP

Consider and include the following as you develop your BCP:

  • The BCP should include the software development life cycle assessment and the software development matrix you completed in prior steps.

  • The BCP should describe the normal operation standards, practices, and procedures for operating systems, including critical systems. Develop standard operating procedures based on what the team identifies as the most critical to least critical to continue business operations. Included in the standard operating procedures and best security engineering practices should be operating system fundamentals, operating system security, management of patches, and operating system protections.

  • All partner nations at the summit have maintained that there will possibly be the use of an ad-hoc wireless network. The nations' CISOs will have to determine differences between rogue access points and authorized service set identifiers (SSID) and authorized access points. These considerations will have to be included in the BCP.

  • Limit the scope to communications systems.

  • The BCP should be tailored to recover from a ransomware attack. Include leadership decision-making options for payouts, such as Bitcoin, which uses block-chain technology. Based on the recent outbreaks of ransomware attacks, identify key components of the given topology and describe how a ransomware incident would be contained or identified if an event occurred inside the given topology. What are the network security threats for a ransomware attack? Include these vectors as scenarios in the BCP and address remediation paths.

  • The BCP should also include an incident response plan, IR response flow for DDoS, malware, insider threats—in case of a need to execute the plan, documentation will be used for identified parties to follow to ensure proper communication channels and flow of information/triggers are understood so breakdown does not occur.

Dot Image
GlobalTutor Posted By :
Questions: 3706 Tutorials: 3600
Tutorials for this Question

Now, as a team, and in accordance with your team agreement, you will create

Tutorial # 00584526
Posted On: 02/15/2018 04:59 AM
Feedback Score: 100% (by 1 users)
Purchased By: 3
GlobalTutor
Posted By:
Questions:
3706
Tutorials:
3600
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Now, as a team, and in accordance with your team agreement, you will create...
Attachments
Business_Continuity_Plan.doc (63.5 KB)
Recent Feedback
Rated By Feedback Comments Rated On
Wide range of subject tutorials with solutions 03/15/2018

Great! We have found the solution of this question!

Related Questions
science discussion nomel
Video provides a powerful way to help you prove your point. When you click Online Video, you can paste in the embed code for the video you want to add. You can also type a keyword to search online for …
Week 1: Information Workflow and Systems Life Cycle
Describe a process where information might be handled better in your current setting, or a setting familiar to you. What would you change, if you could, to improve information workflow, and what proce …
Week 1: Workflow Analysis
The Workflow Analysis assignment is due by Sunday 11:59 p.m. (MT) at the end of Week 1. The guidelines and grading rubric are listed and located below. NR543_W1_Workflow_Analysis_Guidelines_and_Rub …
gcu MIS 600 Full Course
  MIS 600 Full Course Discussions GCU MIS 600 Topic 1 DQ 1 Why is data important to business? What are some industries that use big data for decision making? MIS 600 Topic 1 DQ 2 D …
How Data Integration Supports Data Analytics
For this assignment, you will study the way in which data integration is used to support data analytics within a federal agency, the U.S. Department of Transportation. Use the information in the assig …
Module 01 Course Project - Troubleshooting Process
Module 01 Course Project - Troubleshooting Process In your new role at Concept Solutions, you have been examining several internal issues that require troubleshooting. Below are three incidents tha …
Saint Leo COM590 Final Exam 100% Accurate
Question 1 (4 points) Saved What is pretexting associated with? Question 1 options: Hiring personnel Communication between senior management and general employees Policy disseminatio …
UMUC Excel Project 1 – MS Excel (Fall 2018)
Excel Project 1 – MS Excel (Fall 2018) Use the following project description to complete this activity (all the details are included in this document, in the 22 steps below). For a review of …
Now, as a team, and in accordance with your team agreement, you will create
Now, as a team, and in accordance with your team agreement, you will create an eight- to 10-page Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole e …
Recent Questions
Walden HLTH6038/HLTH8038E Module 6 Final Exam Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 6 Final Exam Question 1 Religion plays a small and insignificant role in health behavior.  True  False &n …
Walden HLTH6038/HLTH8038E Module 5 Quiz Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 5 Quiz Question 1 Step 6 of intervention mapping involves evaluation.   True   False Question 2 The pa …
Walden HLTH6038/HLTH8038E Module 4 Quiz Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 4 Quiz Question 1 The coping appraisal construct of Protection Motivation Theory explains that when people believe a recomme …
Walden HLTH6038/HLTH8038E Module 3 Quiz Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 3 Quiz Question 1 Behavioral control is determined by a set of beliefs the person has that help or hinder performance of the …
Walden HLTH6038/HLTH8038E Module 1 Quiz Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 1 Quiz Question 1 A community level theory focuses on public policy.   True   False Question 2 The ter …
Walden HLTH6038/HLTH8038E All Assignments Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 2 Assignment APPLYING THE HEALTH BELIEF MODEL TO POPULATIONS The Health Belief Model (HBM) has been used extensively to crea …
Walden HLTH6038/HLTH8038E Module 6 Assignment Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 6 Assignment PRACTICAL APPLICATION OF THEORY/MODELS IN “REAL WORLD” SITUATIONS For this Assignment, you will id …
Walden HLTH6038/HLTH8038E Module 5 Assignment Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 5 Assignment APPLYING THE PRECEDE-PROCEED MODEL From an ecological perspective, the Precede-Proceed model has been used to …
Walden HLTH6038/HLTH8038E Module 4 Assignment Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 4 Assignment APPLYING THE SOCIAL-ECOLOGICAL MODEL The Social-Ecological Model (SEM) has been used to explain/predict behavio …
Walden HLTH6038/HLTH8038E Module 3 Assignment Latest 2024
HLTH-6038-1/HLTH-8038E-1 Health Behavior Theory-Spring 2024 Module 3 Assignment APPLYING THEORIES AND MODELS TO EDUCATIONAL INTERVENTIONS FOR TARGET POPULATIONS Creating educational interven …