Question

Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortc...

Identifying flaws in contingency plan

Objectives:

  1. Research real world incidents, identify shortcoming (IR, BP or CP) and recommend possible solutions.

Course Learning Outcomes:

  1. CL05, CL01: Student will be able to understand, implement and bring recommendations to contingency plan

Tools or Equipment Needed:

  1. PC
  2. Internet explorer or chrome
  3. Internet

Theoretical Background:

A contingency plan is a course of action designed to help an organization respond effectively to a significant future event or situation that may or may not happen.

A contingency plan is sometimes referred to as "Plan B," because it can be also used as an alternative for action if expected results fail to materialize. Contingency planning is a component of business continuity, disaster recovery and risk management.

The seven-steps outlined for an IT contingency plan in the NIST 800-34 Rev. 1 publication are:

1. Develop the contingency planning policy statement. A formal policy provides the authority and guidance necessary to develop an effective contingency plan.

2. Conduct the business impact analysis (BIA). The BIA helps identify and prioritize information systems and components critical to supporting the organization’s mission/business functions.

3. Identify preventive controls. Measures taken to reduce the effects of system disruptions can increase system availability and reduce contingency life cycle costs.

4. Create contingency strategies. Thorough recovery strategies ensure that the system may be recovered quickly and effectively following a disruption.

5. Develop an information system contingency plan. The contingency plan should contain detailed guidance and procedures for restoring a damaged system unique to the system’s security impact level and recovery requirements.

6. Ensure plan testing, training and exercises. Testing validates recovery capabilities, whereas training prepares recovery personnel for plan activation and exercising the plan identifies planning gaps; combined, the activities improve plan effectiveness and overall organization preparedness.

7. Ensure plan maintenance. The plan should be a living document that is updated regularly to remain current with system enhancements and organizational changes.

Lab Exercise 1

Using a browser and search engines, search the term “citibank backup tapes lost”.

You will find many articles, pick one of them and address following questions: -

  1. What is the incident?
  1. What part of contingency planning process came short? (IR, BP or CP)?
  1. How can we prevent this from happening again?

Exercise 2

Using a web browser and search engines, search the terms “I-35 bridge collapse and response”. You will find many results. Select at least three articles to skim through the impact on human life, then answer: Did contingency planning saves lives in this disaster? Give your reasoning to your answer.

please write it in computer hand writing not on paper

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Lab Exercise 1

------> “citibank backup tapes lost”

1.What is the incident?

Ans.Citibank consumer finance division announced in June 2005 that there was a data breach of about 3.9 million US customers as the computer tapes containing the data about their accounts had been lost. However no fraudulent activity has been traced back to the data so far, security officers cannot completely rule out future incidents.

2.What part of contingency planning process came short? (IR, BP or CP)?

Ans.Securing sensitive knowledge starts with the high-level security strategy of classifying knowledge into classes,parenthetically,sensitive for info admire Social Security numbers, account info and health knowledge tied to a name confidential for info admire business plans and client data; and general for info admire correspondence. Encryption are often applied in an exceedingly style of ways in which. One resolution is to write sensitive knowledge, admire Social Security numbers, mechanically after they square measure entered into a field. Most of the information systems out there go with constitutional coding schemes.

3.How can we prevent this from happening again?

Ans.

a. The company should encrypt the data.

b. Citibank should notify the public immediately when they lost the tape.

c. They should have blocked all the credit cards and accounts.

d. Continuous data protection can be one of the possible solutions, where a system's data is continually being backed up. This ultimately removes all the issues associated with traditional tape backups in that downtime is not necessary as your data is being backed up continuously as changes are made. Adequate disk storage is necessary to store the most recent revised data in order to implement the solution.

e. Periodically snapshot of the data can be taken; and the snapshots can be backed up to tape for longer term storage at our convenience.

NOTE: Tried giving the first 3 answers of your question. hope it would be of help to you.DO give a thumbs up for my effort. 0:).

Add a comment
Know the answer?
Add Answer to:
Identifying flaws in contingency plan Objectives: Research real world incidents, identify shortc...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expresse...

    Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expressed by either customers, internal stakeholders, employees, or regulatory authorities. In short, a project is a time bound and specific goal oriented task-system that is born out of an ask from any stakeholder. Project initiation is laying down a new project by defining its goals, objectives,...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • KM THE BOYGUES TELECOM WAY The case underneath presents the approach of the Knowledge Management adopted...

    KM THE BOYGUES TELECOM WAY The case underneath presents the approach of the Knowledge Management adopted by a well-known French company. The Bouygues Telecom way With more than six million customers and a network covering 98 per cent of France, Bouygues Telecom, created in 1994 as a subsidiary of the Bouygues global industrial group (turnover : 19 billion euros in 2000), has established itself as one of the most dynamic and innovative players in the French mobile telephony market. But...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • second attempt. need asap please 2-4 sentences summarizing the article 4 interesting quotes from the article...

    second attempt. need asap please 2-4 sentences summarizing the article 4 interesting quotes from the article and 4 points explaining each quote In the first few years of the new millennium, at the height of the boom in the offshore call-center business, Tata Consultancy Services, the Indian technology-services giant, made the counterintuitive decision to divest its call-center operations. Why? Because although outsourced call centers were a fast-growing piece of its current business, TCS’s leadership had come to believe that they...

  • The activity An EHR was implemented at the General Hospital one year ago, before you were...

    The activity An EHR was implemented at the General Hospital one year ago, before you were hired. The implementation process did not go smoothly and now there are strong EHR advocates and strong EHR-dissenters on the team. The CEO wants to move forward with an implementation of the bar-coded medication administration feature of the EHR, but the director of nursing does not. You have been asked to manage the implementation and see that it is successful. You will first need...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Below is the information: It is important to understand the different leadership styles employed by nursing...

    Below is the information: It is important to understand the different leadership styles employed by nursing leaders in healthcare organizations and to understand their significance on nursing practice and patient outcomes, for better or for worse. Objective: Read the articles from Nursing Standard (PDF) and Bradley University (PDF). In -250 words, formulate an opinion on the following: 1. Reflect on an occasion where you experienced ineffective leadership (doesn't have to be in the hospital). What behaviors did they display? What...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT