Now, as a team, and in accordance with your team agreement, you will create

Question # 8 00586734
Subject: Computer Science
Due on: 01/08/2018
Posted On: 02/15/2018 04:59 AM
Tutorials: 1
Rating:
4.9/5
GlobalTutor
Posted By :
Questions:
3706
Tutorials:
3600
Feedback Score:
Report this Question as Inappropriate
Question Dot Image

Now, as a team, and in accordance with your team agreement, you will create an eight- to 10-page Business Continuity Plan (BCP) that addresses the mission needs and systems for recovery of the whole enterprise in the face of a cyberattack event. This BCP will be used to help the CISO identify current systems and timelines that will be used to bring systems back online and the sequence of events that occur during BCP operations. Make sure that all citations are in proper APA format.

Refer to the following documents to assist you in creating the final portion of the BCP:
  • Contingency Planning Guide for Federal Information Systems for examples of what to include in your BCP

  • Best Practices for Creating a BCP

Consider and include the following as you develop your BCP:

  • The BCP should include the software development life cycle assessment and the software development matrix you completed in prior steps.

  • The BCP should describe the normal operation standards, practices, and procedures for operating systems, including critical systems. Develop standard operating procedures based on what the team identifies as the most critical to least critical to continue business operations. Included in the standard operating procedures and best security engineering practices should be operating system fundamentals, operating system security, management of patches, and operating system protections.

  • All partner nations at the summit have maintained that there will possibly be the use of an ad-hoc wireless network. The nations' CISOs will have to determine differences between rogue access points and authorized service set identifiers (SSID) and authorized access points. These considerations will have to be included in the BCP.

  • Limit the scope to communications systems.

  • The BCP should be tailored to recover from a ransomware attack. Include leadership decision-making options for payouts, such as Bitcoin, which uses block-chain technology. Based on the recent outbreaks of ransomware attacks, identify key components of the given topology and describe how a ransomware incident would be contained or identified if an event occurred inside the given topology. What are the network security threats for a ransomware attack? Include these vectors as scenarios in the BCP and address remediation paths.

  • The BCP should also include an incident response plan, IR response flow for DDoS, malware, insider threats—in case of a need to execute the plan, documentation will be used for identified parties to follow to ensure proper communication channels and flow of information/triggers are understood so breakdown does not occur.

Dot Image
Tutorials for this Question

Now, as a team, and in accordance with your team agreement, you will create

Tutorial # 00584526
Posted On: 02/15/2018 04:59 AM
Feedback Score: 100% (by 1 users)
Purchased By: 3
GlobalTutor
Posted By:
Questions:
3706
Tutorials:
3600
Feedback Score:
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of Now, as a team, and in accordance with your team agreement, you will create...
Attachments
Business_Continuity_Plan.doc (63.5 KB)
Recent Feedback
Rated By Feedback Comments Rated On
Wide range of subject tutorials with solutions 03/15/2018

Great! We have found the solution of this question!

Recent Questions
Ethics Memo - You are the HIM Director in an acute care hospital setting
Description Scenario: You are the HIM Director in an acute care hospital setting. Your facility has purchased an electronic health record (EHR) system, and pressure is mounting to deploy this syste …
Grantham HU260 All Quizzies Latest 2022 August
HU260 Strategies for Decision Making Week 1 Quiz    •             Question 1Words such as “because,” &ldquo …
Grantham HU260 Week 3 Midterm Exam Latest 2022 August
HU260 Strategies for Decision Making Week 3 Midterm Exam Question 1In your own words, explain the difference between validity and soundness. Question 2In your own words, construct a syllogism …
Grantham HU260 Week 8 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 8 Quiz    Question 1Which of the following is an example of old media? Question 2Which of the following is an example of new media? Ques …
Grantham HU260 Week 7 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 7 Quiz    Question 1Although the mass media are a modestly good source of breaking news, smaller-scale outlets are much better at analysis, at …
Grantham HU260 Week 6 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 6 Quiz    Question 1Loyalty and provincialism are related to prejudice. Question 2Loyalty inclines us to see our own society and its belief …
Grantham HU260 Week 5 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 5 Proctored Exam Question 1Even perfectly good statistics can be misused. Question 2Polls can be misleading because of Question 3Identify the fall …
Grantham HU260 Week 4 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 4 Quiz    •Question 1       Identify the fallacy: Misrepresenting someone’s position to make it easie …
Grantham HU260 Week 3 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 3 Quiz    Question 1This moral theory prioritizes the greatest good for the greatest number of people. Question 2This moral theory prioriti …
Grantham HU260 Week 2 Quiz Latest 2022 August
HU260 Strategies for Decision Making Week 2 Quiz    Question 1Affirming the consequent and denying the antecedent are examples of deductively invalid argument forms. Question 2An ar …
Loading...