Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Planning for Information Security

You have been hired as a consultant to design BCP for SanGrafix, a video and PC game design company. SanGrafix's newest game has become a hot seller, and the company anticipates rapid growth. It's moving into a new facility and will be installing a new network. Because competition is fierce in the game industry, SanGrafix wants to be fully secured, documented, and maintained while providing high availability, scalability, and performance.

Based on your current technology and information security knowledge, for this project you will design a BCP based off of the company profile below:

A. Primary location in San Francisco, CA

B. Secondary location/hot site in Sunnyvale, CA

C. Capable of supporting 220 users in these departments: Accounting and Payroll, 16; Research and Development, 48; Sales and Marketing, 40; Order Processing, Shipping, and Receiving, 36; secretarial and office management staff, 20; upper management (including the president, vice president, and general manager), 10; Customer Relations and Support, 30; Technology Support, 20.

D. Full OC3 Internet connection

First step is to issue a clear policy statement on the Business Continuity Plan. At a minimum, this statement should contain the following instructions:

• The organization should develop a comprehensive Business Continuity Plan.

• A formal risk assessment should be undertaken in order to determine the requirements for the Business Continuity Plan.

• The Business Continuity Plan should cover all essential and critical business activities.

• The Business Continuity Plan should be periodically tested in a simulated environment to ensure that it can be implemented in emergency situations and that the management and staff understand how it is to be executed.

• All staff must be made aware of the Business Continuity Plan and their own respective roles.

• The Business Continuity Plan is to be kept up to date to take into account changing circumstances.

• BELOW IS THE EXAMPLE

• Policy Statement1. Agencies are required to develop, implement, test and maintain a Business Continuity Plan (BCP) for all Information Technology Resources (ITR) that deliver or support core systems and services on behalf of the Commonwealth of Massachusetts. For purposes of this policy, the BCP is the overall plan that facilitates sustaining critical operations while recovering from a disruption. BCP's are required to include, at a minimum:

o Standard Incident Response Procedures: An information system-focused set of procedures to be used when an event occurs that is not part of the standard operation of a service and may or does cause disruption to or a reduction in the quality of services and Customer productivity.

o Disaster Recovery Plan (DRP): An information system-focused plan designed to restore operability of the target system, application, or computer facility infrastructure in the event of large scale disaster and/or other cataclysmic event.

o Continuity of Operations Plans (COOP): An information system-focused plan invoked under a DRP when access to the primary facility infrastructure is prevented for an extended period, requiring operations to be restored from an alternate site after an emergency. The COOP may be supported by multiple information system contingency plans to address recovery of impacted individual systems once the alternate facility has been established. The COOP only addresses information system disruptions that require relocation. (From NIST SP 800-34).

2. Agencies are required to conduct risk assessments to identify, estimate, and prioritize risks to organizational operations and conduct business impact analyses to identify all critical functions of the agency, entity or business unit and their supporting information systems. ITD's Compliance Assurance Office is available to assist and/or conduct such assessments.3. Agencies are required to articulate specific information, including the details necessary to effectively respond, manage, and recover from either an incident or a catastrophic event. Further, protecting data and confidential information should be integrated into the above referenced details.4. Agencies are required to ensure that all BCPs and supporting DRPs and COOPs are in alignment with and in support of any and all legal and regulatory requirements that the agency ITR's are subject to.5. Agencies are required, at a minimum, to include the following documentation and procedures in their BCP and its supporting components:

1.

1. Scope / Objectives
2. Risk Evaluation and Required Security Controls
3. Business Impact Analysis
4. Communications Procedures
5. BCP Organization Structure

1. Activation of plans
2. Succession of Authority Procedures
3. BCP Team Roles and Responsibilities

1. Incident/Event Response Teams
2. Emergency/DR Response Teams

4. Primary and Alternate Contact Lists

6. Damage Assessment
7. Recovery Plans

1. Critical System Recovery

1. Prioritization of Recovery
2. Interdependencies
3. Resource requirements
4. Security Controls
5. COOP

1. Mobilizing Alternate Locations / Resources
2. Managing Alternate Locations / Resources
3. Critical System Support

1. Short term
2. Long term
3. Local
4. Regional
5. Pandemic

6. Agencies are required to verify that critical third party vendors meet agency business continuity requirements during the contract negotiating process and prior to contract agreement and signature. Alternate third party vendors are required to be identified where appropriate.

7. Agencies are required to securely store copies of plans and supporting materials in a remote location; at a sufficient distance to escape any damage from a disaster at the agency's main information processing facilities and be available (via remote connection, external e-mail location, etc.).

8. Agencies are required to document, implement and annually test plans including the testing of all appropriate security provisions to minimize impact to systems or processes from the effects of major failures of IT Resources or disasters.

9. Agencies are required to identify appropriate mechanisms to ensure that plans remain current and updated between annual tests and reviews accounting for:

1.

1. Change management implications
2. New/Major upgrades of system implementations
3. New policy adoption
4. New contract implementations
5. New threat/risk identification
6. Staff/resource/responsibility changes

1. Agencies are required to publish plans and sufficiently train any and all individuals that are required or responsible for supporting the BCP.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92173302

Have any Question?


Related Questions in Management Information System

Write 500 word response to the case belowcase study

Write 500 word response to the case below. Case study Statement and Tasks Refer to the textbook chapters 4, 5, 6, the attached handout "Network Attacker Document", and your findings from searching the internet about netw ...

Read cybercrime deterrence and international legislation

Read "Cybercrime Deterrence and International Legislation: Evidence From Distributed Denial of Service Attacks," by Hui, Kim, and Wang, from MIS Quarterly (2017). Refer to this reading when completing Topic 8 DQ1. Read " ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Assignmentcontinuing with a company you selected in week

Assignment Continuing with a company you selected in Week Two, evaluate network management components on a global scale. Write a 2- to 3-page paper that evaluates and discusses the following: Impacts of Performance Manag ...

Asking questions worksheetdirectionsin this assignment you

Asking Questions Worksheet Directions: In this assignment, you work with the categories of questions discussed in Ch. 6 of your text to gain understanding about different points of view. 1. List the three categories of q ...

Assessment instructionsin this assessment you will design

Assessment Instructions In this assessment, you will design and code a Java console application that takes as input five integer values and produces as output the lowest and highest values of these five integer values. T ...

Case 3 focuses on capturing system requirements an

Case 3 focuses on capturing system requirements, an important component of any model of the software development process. It is important to remember that the purpose of requirements is to specify the problem that the sy ...

Assignmentpart 1 research and detail an example of how you

Assignment Part 1: Research and detail an example of how you would for steganography to hide a message. Would you use a picture, video, audio message? Explore and select one method and detail in 1 page with figure, pictu ...

Please answer all 3 questions with 250 words or more thank

Please answer all 3 questions with 250+ words or more. Thank you 1. What tools, methodologies, or frameworks are available to assist us in detecting vulnerabilities and auditing issues in the mobile phone environment? 2. ...

In assignment you proposed automation for an inventory

In Assignment you proposed automation for an inventory management problem. Please respond to the following: Summarize your experience developing a workflow for the clothing store. Do not discuss details of your solution. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As