Question

TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

TASK

Read the Regional gardens case study document before attempting this assignment.

Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources.

You are concerned that the company has no existing contingency plans in case of a disaster.

The Board indicated that some of their basic requirements for contingency planning include:

- A Recovery Time Objective (RTO) of 2 hours

- A Recovery Point Objective (RPO) of 4 hours

Based on these, you now need to determine:

- The Maximum Tolerable Downtime (MTD),

- The Work Recovery Time (WRT) and

- The system and data recovery priority.

The Board expects that you will propose a Business Continuity Plan (BCP) for Regional Gardens. The Board expects you to use as much of their existing resources as possible for the BCP, but understands that some additional resources may be required. Your BCP proposal must clearly state what additional resources, in terms of hardware, software and locations, are required.

Tasks:

You are to develop a proposal for a Business Continuity Plan (BCP) for Regional Gardens in accordance with the Board's instructions above. Your proposed BCP must include:

1. An overview of the entire BCP,

2. A Business Impact Analysis

3. An Incident Response Plan

4. A Backup plan,

5. A Disaster Recovery plan,

Your proposed BCP should include the following headings:

- Executive Overview

- Business Impact

- Incident Response

- Backup

- Disaster Recovery

Regional Gardens Case Study

Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. The company also owns the Regional Gardens Nursery which sells plants and garden supplies to the public. The company also owns Regional Garden Planners, which is a small company that provides garden advice, design and consultancy services.

The company has a small data centre at its main site in Bathurst where the company’s servers and data storage is located.

The company has some 65 staff, who include management, administrative staff, nursery and Regional Garden Planners staff. The company has a range of different types of relatively old personal computers, which run mainly run Windows 7 Enterprise, to connect to the company data centre. The company also has 3 MacBook laptops running OS X.

The company does not have a clear patching and update policy. As a result most servers and desktop machine are patched on an ad-hoc basis and as time, and operations, permit.

The company has a small number of systems administration staff that are responsible for the management of the server infrastructure. But effective administration is somewhat hampered by the fact that the administrative passwords are generally well-known across the company. Company employees enjoy free, open, unrestricted access to the Internet, but realistically they only need to access certain websites on the Internet. Company management would like there to minimise the cost of accessing web resources.

The company consists of the following departments:

- Nursery staff (35 people)

- Regional Gardens Planning (15 people)

- Systems administration (3 people)

- Management (4 people)

- Human Resources & Legal (3 people)

- Finance (3 people)

- Administration (2 people)

There are no formal onboarding and offboarding processes in the organisation. There is close to no policy framework in the organisation.

Infrastructure

The company uses several servers to conduct its core business. The company has the following server infrastructure:

- 2 x Active Directory domain controllers on Windows Server 2008 R2;

- 3 x SQL Server 2003 database servers on Windows Server 2003;

- 1 x Exchange 2007 email server on Windows Server 2008 R2;

- 4 x Windows Server 2003 File and Print servers;

- 2 x Red Hat Enterprise 5 Linux servers running Apache and TomCat.

Each of these servers are independent machines with relatively vanilla installs of their respective operating systems. The servers are not running the latest operating systems nor have they been recently patched. All servers have publicly accessible addresses and hence can be accessed from the Internet.

The servers are all commodity x86 servers that have been purchased as required. There are no maintenance contracts on either the hardware or any installed software. Most of the servers and desktops are over five years old.

Services and Data

The servers store the following;

- Home directories,

- Mail,

- Database objects for various development and production environments (for various departments),

- Active Directory Meta Data Object,

- Customer garden project information directories,

- Nursery plant data directories,

- Nursery supplies data directories Corporate Finance and Personnel Data,

- Web Page Data.

- Customer data,

- Market intelligence and strategic planning data.

- Other forms of Intellectual Property

Most services are only used within the company, however the company does have a internet presence via its web pages and mail server. Despite this some of the garden planners work from home in the evenings and access some services from their home workstations, tablets or mobile devices. You can assume there is no redundancy/ fail over in the disks hence if a disk goes bad, that data is lost and the service associated with it fails.

The most important data to the company, in order of importance, is:

Corporate finance data

- Nursery product data

- Nursery supplies data

- Strategic planning data

- Customer planning data,

- Personnel data,

- Web page data,

- Email,

The integrity of this data must always be preserved.

Administration

Most of the staff in the company knows the administration passwords for the servers and desktops. It should be noted that all users have accounts on the mail, database and database servers.

The administration of the servers tends to be haphazard. There are often storage issues with storage as disks fill up regularly. There are a lot of active but unused accounts for users who have now left the company. The company is dependent on its servers for continued access to services, but there are no monitoring systems in place.

External hackers have compromised some desktop machines in the past. The administrators are reasonably confident that the servers have not been compromised. That said, when a host is compromised; the administrators merely disable the hack and continue to allow the machine to be used. Most compromises are noticed too late, i.e. well after the hack has occurred.

Security

The company does not have a firewall or any other security system in place. Currently all services offered by the servers are accessible via the Internet. All servers, and most desktops have a basic anti-virus system in place, but it has not been updated recently. There is no anti-virus on the MacBooks as the company has been told that they “don’t get viruses”. There is no overall email virus protection in this company.

Backup and Disaster Recovery

The company does not have any backup or disaster recovery systems/ procedures.

Network and Physical Location

The servers and core network infrastructure are located in common workspace as other infrastructure and employees of the organisation. In addition to this the servers are on the same networks as user workstations and there is no network security. The company is connected to the Internet via a ADSL modem connected to a router. The router connects to a several 10mb hubs, which provide access to the staff (there is only one LAN).

Individual Workstations & Passwords

Each employee has a desktop computer. Most of the computers are running a vanilla install of Windows 7 Enterprise that, in most cases, has not been patched since install. Employees often keep corporate data on these desktops in their home directory, which is not backed up.

In addition to this everyone has administrator privileges to their workstation. As the environment is relaxed, a user can have accounts on other employee computers possibly using the same or different password.

The company has no hard and fast rules about passwords; in fact the most common password used is the person’s name. These passwords are also indicative of what is used on the server machines.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

1. Executive Overview of BCP

Business Continuity Plan (BCP) involves Disaster Recovery Plan and Business Impact analysis.It involves recovery from a potential threat happens to the company.The plan also involves protecting personnel and assets of the company.It also involves functioning of the system in the event of a disaster.

2. Business impact analysis

This involves systematic evaluation of the interruption to Business operation of Regional Gardens in case of disaster.

3. Incident Response Plan

All employee personnel are properly trained related 6 phases of incident response role which are Preparation, Identification, Containment,Eradication and Recovery .Make them to identify if there is any potential threat occurs. Eradicate if they found any malicious software or virus running in the PC.

4.Back up Plan

Policy is to introduced regarding a back up for each employee computer should be done momentarily and periodically.Administrator must be assigned with a password to protect the back up data.

5. Disaster Recovery Plan

  • Company security management system should have a latest updated firewall.All employee personnel PC must have a latest upgraded antivirus software versions. Macbooks should be involved with antivirus software.
  • Administration password for the servers and desktops should not be shared as these may lead to data breach. Password should be secret and must be known to data administrator who maintains the server.
  • Email and Web server should be subjected to maintenance during free hours.
  • Company should formulate a policy neither to share password of other employees nor to access other employee account.
  • Every employee systems should be periodically subjected to security patch.
  • Employee must have individual workspace and should have latest upgraded OS like Windows 10.
Add a comment
Know the answer?
Add Answer to:
TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has...

    Regional Gardens Ltd is a company that runs a number of related gardening enterprises. It has a large display garden that it opens for public inspection a number of times a year. These enterprises include the Regional Gardens Nursery which sells plants and garden supplies to the public, and Regional Garden Planners which provides garden advice, design and consultancy services. Regional Gardens Ltd has a small data center at its main site in Bathurst where the company’s servers and data...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Task back to top Read the DTGOV Case Study before you attempt this assignment DTGOV want to migra...

    Task back to top Read the DTGOV Case Study before you attempt this assignment DTGOV want to migrate some of their webservers to an IaaS instance in AWS to test their strategy. They understand that they need to do a full migration plan first, but they want to determine what sort of architecture would be required to support their web services. The web services are considered essential by both DTGOV and their users, so any web services must be: Readily...

  • Critical Thinking Question, Read the following case study and answer the questions that follow. Respond to...

    Critical Thinking Question, Read the following case study and answer the questions that follow. Respond to at least two of your peers with meaningful content. Novartis’s Prescription for Invoice Processing What do you do when you have more than 600 business units operating through 360 independent affiliates in 140 countries around the world—processing complex invoices in various languages and currencies? You seek out the best technology solution to make the job easier. At global pharmaceutical giant Novartis, the IT department...

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • CASE STUDY:"They Like It the Way It Is"

    Rita is head cocktail server at a high-volume singles bar that serves both food and drinks. She has CASE STUDY: "They Like It the Way It Is" responsibility for a large staff of part-timers, most of whom she worked with as a server before she was promoted. They are a lively bunch who regard themselves more as independent entrepreneurs doing business at this particular place than as loyal employees. Most of them pay little attention to rules, but they are...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • What would you recommend regarding the issue solution and give the best solution ? Case study...

    What would you recommend regarding the issue solution and give the best solution ? Case study to answer all these question is as follow : When Robert Foster arrived at Home Improvement Inc. in December 2000, the deck seemed stacked against the new CEO. He had no retailing experience and, in fact, had spent an entire career in industrial, not consumer, business. His previous job was running Standard Electric’s power systems division, whose multimillion-dollar generating plants for industry and governments...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT