Csis discussion and replies | Computer Science homework help

Instructions 

Write a thread containing a thoughtful answer to 1 question.  Answer should  contain at least 400 words.  If necessary, you may list within your  thread any concepts on which you need further clarification as well.   Also, you must reply to at least 2 threads below.  Each reply  should contain at least 200 words.  Additionally, all posts  (thread and replies) should reflect professional writing, current APA  standards, include at least 1 scholarly reference (e.g., peer-reviewed  journal articles), and integration of at least 1 biblical principle.

Thread Question: (in 400 words at least)

Why should the IT department not be solely responsible for business continuity?

Replies(Reply to each thread in at least 200 words EACH)

Thread #1

  Business Continuity and Disaster Recovery Goal         

                Cybersecurity revolves around the CIA triad and  protecting the information by ensuring its confidentiality, integrity  and availability. The Triad’s purpose is to guide the information  security practitioner in creating policies and controls that protect  systems against outside and inside intrusion, as well as, natural  disaster. Business Continuity planning and Disaster recovery effort’s  number one goal is to protect the availability of information in the CIA  Triad. Business Continuity Plans a as well as Disaster Recovery plans  must be defined and understood, to understand the necessity of policies  that protect the availability of information, and their importance in  the overall goals of information security.

                Business continuity planning is the process of  identifying the potential losses from external threats and consequential  losses due to the loss of key business processes from an accident,  attack, disaster, or physical damage to essential hardware and software  (Pinata, 2011). Business continuity planning would identify all the  potential impacts from a disaster and would direct the upper level  management to identify specific targets for policies that would mitigate  the damage and ensure systems are available quickly.

                Disaster Recovery Planning restores the  operability of systems that support mission-critical processes as  quickly as possible (Bahan, 2003). Disaster recover planning occurs  before a disaster occurs, and addresses the targets identified during  the business continuity process. Disasters can be anything from natural  disaster to malware attacks, such as ransomware, that encrypt all data  in servers.

A business continuity plan should  address the acceptable amount of downtime and thus the Disaster recovery  policy should attempt to recover systems in that amount of time.  Systems should be backed up regularly and the backups should be tested  to ensure the availability of information in the case of a disaster  occurring. If systems are not tested regularly the plan would only be  theoretical and would not ensure the availability of information in an  emergency.

Ransomware attacks, as the one  recently seen in Baltimore, is becoming a common attack and  organizations must take business continuity and disaster recovery  planning serious to ensure that mission-critical systems are up and  running quickly and does not prevent normal operations for a long period  of time.

Thread #2

“As organizations and information systems (IS) increasingly  commingle, any incident with organization IS may cause significant  organizational damage.” (Niemimaa, 2015). That is why the notification  procedures must be clearly documented for a number of reasons ranging  from informing stakeholders to ensuring staffing requirements during a  disaster. In the event of a disaster or emergency situation, certain  individuals on multiple levels of an organization may need to be  informed or report to work to deal with these issues. This can range  from a first-line supervisor to the CEO of the organization, but the  contingency plan should have in place a definitive notification  procedure to ensure all personnel that need to be informed are informed.  According to Gregory, all parties involved with an organization that  may be affected by the disaster should be notified, to include:  employees, suppliers, customers, regulators, authorities and  stakeholders (2015). While the who of the notification procedure makes  up the bulk of the material, how those individuals are notified can be a  pressing matter as well. Depending on the type and severity of a  disaster, the responses can range from e-mail notifications to phone  calls to in-person visits. Depending on the cost, type and severity of a  disaster, it can dictate how individuals should be contacted, or it can  dictate if they would like to be contacted at all. 

In the organization I currently work in, our contingency plan is  based off the severity of the incident, the time/day of week and how  large the incident is. All of those factors dictate whether we call  anyone at all, whether we call just the administrators to fix the  issues, or whether we call the administrators and the organization’s  leaders. The contingency plan should lay the groundwork for notification  procedures, but it should also put into place the details around  different types of problems and disasters. As I mentioned above about my  organization, different people wish to be notified at different levels  or degrees that evolve over the lifetime of a problem or disaster. For  this reason, a corresponding list of notification instructions should be  kept and updated frequently to ensure that correct means of  communication are still accurate and when one of these individuals would  like to be notified in the event of a problem or disaster. On a side  note, ways of communicating to designated personnel should be closely  adhered. Notifying personnel to little or to much can de-simplify the  issue, or it can cause the issue to seem larger than it is prompting an  inaccurate response.

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.