ISOL533 University of the Cumberlands Info Security and Risk Management Complete the BIA table below and use it for the remainder of the assignment. You ma

ISOL533 University of the Cumberlands Info Security and Risk Management Complete the BIA table below and use it for the remainder of the assignment. You may want to review your Lab #07 assignment where you developed a BIA table. Information needed to create the Business Functions and Processes below are in the “Project Management Plan” scenario and the “Project Health Network Visual”. Hint: look at the processes that go from the customers and into the systems/applications in the “Project Health Network Visual”. ISOL 533 – Information Security and Risk Management
University of the Cumberlands
Task 1. Complete the BIA table below and use it for the remainder of the assignment. You may want
to review your Lab #07 assignment where you developed a BIA table. Information needed to create the
Business Functions and Processes below are in the “Project Management Plan” scenario and the
“Project Health Network Visual”. Hint: look at the processes that go from the customers and into the
systems/applications in the “Project Health Network Visual”.
Business Function or Process
Business
Impact
Factor
Recovery
Time
Objective
IT Systems/Apps
Infrastructure Impacts
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
Task 1: Business Impact Analysis – extracts from the Boiler Plate
1.
Overview
This Business Impact Analysis (BIA) is developed as part of the contingency planning process for the
HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system. It was
prepared for Health Network, Inc (Health Network).
2.
System Description
3.1.1
Identify Outage Impacts and Estimated Downtime
Estimated Downtime
The table below identifies the MTD, RTO, and RPO for the organizational business processes that rely on
the HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system.
Mission/Business Process
For HNetExchange
MTD
RTO
RPO
Mission/Business Process
For HNetConnect
MTD
RTO
RPO
Mission/Business Process
For HNetPay
MTD
RTO
RPO
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
Task 2: Business Continuity Plan – extracts from the Boiler Plate
EMERGENCY MANAGEMENT STANDARDS
Data backup policy
Full and incremental backups preserve corporate information assets and should be performed on a
regular basis for audit logs and files that are irreplaceable, have a high replacement cost, or are
considered critical. Backup media should be stored in a secure, geographically separate location from
the original and isolated from environmental hazards.
Department-specific data and document retention policies specify what records must be retained and
for how long. All organizations are accountable for carrying out the provisions of the instruction for
records in their organization.
IT follows these standards for its data backup and archiving:
Tape retention policy
Backup media is stored at locations that are secure, isolated from environmental hazards, and
geographically separate from the location housing the system.
Billing tapes
•
•
•
Tapes greater than three years old are destroyed every six months.
Tapes less than three years old must be stored locally off-site.
The system supervisor is responsible for the transition cycle of tapes.
System image tapes
•
•
•
A copy of the most current image files must be made at least once per week.
This backup must be stored offsite.
The system supervisor is responsible for this activity.
Off-site storage procedures
• Tapes and disks, and other suitable media are stored in environmentally secure facilities.
• Tape or disk rotation occurs on a regular schedule coordinated with the storage vendor.
Access to backup databases and other data is tested annually
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
Task 3: Disaster Recovery Plan – extracts from the Boiler Plate
DISASTER RECOVERY PLAN FOR
OVERVIEW
PRODUCTION SERVER
IT INFRASTRUCTURE
Location: Enter location
Provide details on what systems, applications, databases and
equipment are involved.
BACKUP STRATEGY FOR
SYSTEM ONE
DAILY / MONTHLY /
QUARTERLY
Choose which strategy on the left is use.
DISASTER RECOVERY
PROCEDURE
RISK #1: LOSS OF
COMPANY DATA DUE TO
HNETPAY HARDWARE
REMOVED FROM
PRODUCTION SYSTEMS.
Provide details
RISK #2: LOSS OF
CUSTOMERS DUE TO
PRODUCTION OUTAGES.
Provide details
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
DISASTER RECOVERY PLAN FOR
OVERVIEW
PRODUCTION SERVER
IT INFRASTRUCTURE
Location: Enter location
Provide details on what systems, applications, databases and
equipment are involved.
BACKUP STRATEGY FOR
SYSTEM ONE
DAILY / MONTHLY /
QUARTERLY
Choose which strategy on the left is use.
DISASTER RECOVERY
PROCEDURE
RISK #1: LOSS OF
COMPANY DATA DUE TO
HNETCONNECT
HARDWARE REMOVED
FROM PRODUCTION
SYSTEMS.
Provide details
RISK #2: LOSS OF
CUSTOMERS DUE TO
PRODUCTION OUTAGES.
Provide details
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
DISASTER RECOVERY PLAN FOR
OVERVIEW
PRODUCTION SERVER
IT INFRASTRUCTURE
Location: Enter location
Provide details on what systems, applications, databases and
equipment are involved.
BACKUP STRATEGY FOR
SYSTEM ONE
DAILY / MONTHLY /
QUARTERLY
Choose which strategy on the left is use.
SYSTEM DISASTER
RECOVERY PROCEDURE
RISK #1: LOSS OF
COMPANY DATA DUE TO
HNETEXCHANGE
HARDWARE REMOVED
FROM PRODUCTION
SYSTEMS.
Provide details
RISK #2: LOSS OF
CUSTOMERS DUE TO
PRODUCTION OUTAGES.
Provide details
ISOL 533 – Information Security and Risk Management
University of the Cumberlands
Task 4: Computer Incident Response Team Plan – extracts from the Boiler Plate
Appendix A – Incident Response Worksheet
Preparation:
What tools, applications, laptops, and communication devices were needed to address the Computer
Incident Response for this specific breach?
Identification: When an incident is reported, it must be identified, classified, and documented. During
this step, the following information is needed:
•
Identify the nature of the incident
o What Business Process was impacted
o What threat was identified
o What weakness was identified
o What risk was identified
o What was the Risk Factor/Impact of the incident
o What was the RTO, MTD and RPO assigned to the business process
o What hardware, software, database and other resource were impacted
Containment: The immediate objective is to limit the scope and magnitude of the computer/securityrelated incident as quickly as possible, rather than allow the incident to continue to gain evidence for
identifying and/or prosecuting the perpetrator.
•
What needs to be done to limit the scope of the incident
Eradication: The next priority is to remove the computer/security-related incident or breach’s effects.
•
What needs to be done to mitigate the risk of the incident
Recovery: Recovery is specific to bringing back into production those IT systems, applications, and
assets that were affected by the security-related incident.
•
What needs to be done to recover the IT systems
o What procedures need to be used and are they covered in the Disaster Recovery Plan
o Would the Business Continuity Plan be executed in response to this incident
o Would any issues be identified that would lead to updates to the BIA, BCP or DR plans.

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
ISOL533 University of the Cumberlands Info Security and Risk Management Complete the BIA table below and use it for the remainder of the assignment. You ma
Just from $13/Page
Order Essay
Homework On Time
Calculate the Price of your PAPER Now
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.

Admissions

Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.

Reviews

Revising your paper

Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers