Question? Call Us  +1 (817) 546-4770

MSCS2103 : Disaster Recovery And Business Continuity

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

MSCS2103 : Disaster Recovery And Business Continuity

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MSCS2103 : Disaster Recovery And Business Continuity

0 Download8 Pages / 1,753 Words

Course Code: MSCS2103
University: American Public University System

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United States

Question
Report Structure : Disaster Recovery and Business Continuity 
Business Impact Analysis
Insurance Consideration
Incident Response Team
Physical Safeguards
Prepared Items
Incident Response Procedures
Restoration Procedures
Forensics Considerations
Maintaining the Plan

Answer
Introduction
The First National University or FNU is the first higher education institurion in the country to implement distance education via online programs handling over a wide area covering numerous students and faculty. Recently, due to few issues noticed in the business process, the organization handling the institution had suggested a change in the business structure by introducing latest technological advancements including Work-at-Home or WAT policies and IT networking techonologies (Ab Rahman, Cahyani and Choo 2017). This report would thus include the wholesome analysis of the implementation including the business impact analysis of the latest technology, the insurance considerations, the implementation of the incidence reponse team, the physical safeguards taken, the already prepared items, the incident response procedures, the restoration procedures, the forensics considerations and the ways by which the implementation plan would be maintained.
Business Impact Analysis
A business impact analysis or BIA mostly focuses on the consequences of a disruption in the business process and gathers information about how these disruptions can be eliminated from the process and develop a strategy for the recovery of the system (Torabi, Soufi and Sahebjamnia 2014). Based on the case scenario of First National University or FNU, the general considerations for Business Impact Analysis or BIA is as listed as below:

Potential impact of the disruption: It has been found according to the reports that the entire institution of FNU has been under an intrecate and severely complex ICT infrastructure. It is speculated that this would impact heavily on the growth and sustainability of the organization.
Financial impact of the disruption: The suggested recovery program involved a network security plan, a redesigning of network, and implementation of the technology. This would indefinitely need a huge amount to be implemented from the organization, which may impact heavily.

Insurance Consideration
There are many kinds Cyber Insurance types that any considerable organization follows according to the coverage they possess, and any organization should begin their assessment needed for the cyber insurance with the assessement of the risk and perils of the insured sources (Hill 2016). While evaluating the Insurance Considerations for the networking structure of the organization, It should be kept in mind that the policy of insurance should consider all the apps of emissions of the third parties and according to the Fine National University there are some terms of exclusions that are explained below:
Types of Cyber Insurance Considerations

First Party Coverage

Third Party Coverage

· Network interruption or any other business interruption
· Cyber extortion or ransomware attacks
· Loss and restoration of data
· Crisis management
· Theft or fraud
· Forensic investigation costs
· Regulatory fines
· Media liability

· Privacy liability
· Breach notification costs
· Credit monitoring
· Virus or malicious code transmission

                                   Table 1: Insurance Considerations
                                                  (Source: Created by Author)
Incident Response Team
Every computer network implementation means a computer incident response team or CIRT which is a group handling the events that involves the security breaches of a computer. This is a security Management process that most organisations utilise in order to prevent the problems they frequently have with the security such as events that might still occur unexpectedly and this should be handled effectively by the computer incident response team experts (Ab Rahman and Choo 2015). Fine National University as well a team members should be included who would specify in the department and specialities of handling intricate breaches. These include unexpected ransomware attacks, data thefts, and simplifying of the too complicated netwroking structure that the organization currently faces.
Physical Safeguards
Physical safeguards can be defined as the physical policies measures and procedures that is required to protect the electronic information of a covered entity or an organisational system as well as all the related equipments and buildings from any kind of natural or environmental hazards or any unauthorised intrusion (Quick and Choo 2016). Fine National University has recently implemented issues load of latest devices that needs to be protected from any natural hazards or unauthorised intrusions. Following would be the steps to be taken for an effective physical safeguarding:

Contingency Operations: This step involves process implemented for restoration of lost data.
Facility Security Plan: These are the procedures to safeguard the facility and the equipment, barring any unauthorized instrusion.
Maintening Records:This is the documentation of all the processes for maintaining the data according to the changes implied or the progression of the latest provisions (Cahyani et al. 2017).
Access Control and Validation Procedures: This procedure ensures individual access to any role or function including visitor control and secured access.

Prepared Items
ICT infrastructure at Metro and Regional campuses: Hardware

Department

Device

Specification

Number of Items

Entire staff

Desktop PCs

Windows 7 OS and dual monitors, first generation Webcams and Headsets

 

Faculty (Only)

Printers

Networked Laser Printers

4

Labs (Only)

Desktop PCs and Printers

Windows OS

24 for 10 Labs and Laser Printers

Local Storage

Network Attachment Storage

 

1

Organization

Ethernet

100 Base TX Switched

100

                             Table 2 : ICT Infrastructure (Hardware)
                                                  (Source: Created by Author)
ICT infrastructure at Headquarters (main campus): Hardware

Department

Device

Specification

Number of Items

Entire Staff

Desktop PCs, Headsets and Webcams, Printers and Video Phone

Windows 10 and Dual Monitor, Laser Printers with networking facilities and Video Phones with VoIP

20 Printers

Labs (Only)

Desktop PCs and Printers

Windows 10 and networked printers

24 PCs and Printers each for 50 Labs

Local Storage

Storage System

Network Attachement Storage or NAS

1

Organization

Ethernet

100 Base TX Switched

100

                              Table 3: ICT Infrastructure (Headquarters)
                                                      (Source: Created by Author) 
ICT infrastructure at Operations site

The Operating systems have a combination od Windows and Linus Operating Systems at once.
The entire staff possesses Desktop PCs for individual use running on Windows 8 OS.

ICT infrastructure at Backup site
The backup site infrastructure have the same facility as the Operations.
Incident Response Procedures
Incidents can be of different types based on the nature of intrusion that had been in the institute (Ruefle et al. 2014). Nevertheless underlying is a list of incident response process and procedures that leads any kind of incident managed quite existentially. This should first be done as follows:

Prioritizing assets
Connecting, communicating and collaborating
Observe
Orient
Act
Make a decision about the handling of the incident

Restoration Procedures
Data restoration procedures should follow the underlying procedures for data restoration process:

Request for data backup
Automated backup process
Evaluation of institution needs for the data
Evaluation of the technical needs or any backup plan for the restoration (Littlefieldet al. 2016)
Process verification for backup
Restoration test
Inspection of backup log
Media storage checking
Informing the requester about the status
Starting data restoration

Forensics Considerations
The forensic considerations that the institue of FNU needs right now for data disaster discovery and business continuity is as follows:

Legal Precedence
Testing methodology
Activity record maintenance
Monitoring internet activity (Chang 2015)
Local host activity monitoring
Configuration and use of the system implementation
Analysis of platform and tools

Maintaining the Plan
It is adviced to the Fine National University or FNU is that, it needs to keep up with the latest implementation according to the steps followed in the disaster recovery procedure and business restoration and continutiy plan (Rashmiet al. 2015). This is the only way by which the intricate and complicated system could be maitained or kept tamed. The regular data monitoring and record keeping to check the system vulnerabilities and further attacks for the data and information of the institute would ensure further effective preventive measures.
Conclusion
Thus, it can be concluded that Fine National University has been one of the primary institutions but the ICT Infrastructures have not been at par with the other levels of organizations having the same facilities as them.This report included the wholesome analysis of the implementation including the business impact analysis of the latest technology, the insurance considerations, the implementation of the incidence reponse team, the physical safeguards taken, the already prepared items, the incident response procedures, the restoration procedures, the forensics considerations and the ways by which the implementation plan would be maintained. Therefore, all the vulnerabilities of the system have been identified along with all the considerations that we needed to be made for the disaster recovery and business continuity of the university.
References
Ab Rahman, N.H. and Choo, K.K.R., 2015. A survey of information security incident handling in the cloud. Computers & Security, 49, pp.45-69.
Ab Rahman, N.H., Cahyani, N.D.W. and Choo, K.K.R., 2017. Cloud incident handling and forensic?by?design: cloud storage as a case study. Concurrency and Computation: Practice and Experience, 29(14), p.e3868.
Cahyani, N.D.W., Martini, B., Choo, K.K.R. and Al?Azhar, A.M.N., 2017. Forensic data acquisition from cloud?of?things devices: windows Smartphones as a case study. Concurrency and Computation: Practice and Experience, 29(14), p.e3855.
Chang, V., 2015. Towards a Big Data system disaster recovery in a Private Cloud. Ad Hoc Networks, 35, pp.65-82.
Hill, D.G., 2016. Data protection: Governance, risk management, and compliance. CRC Press.
Littlefield, D.A., Nallathambi, V.K. and Chanchlani, G., CommVault Systems Inc, 2016. Data recovery operations, such as recovery from modified network data management protocol data. U.S. Patent 9,244,779.
Quick, D. and Choo, K.K.R., 2016. Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), pp.723-740.
Rashmi, K.V., Shah, N.B., Gu, D., Kuang, H., Borthakur, D. and Ramchandran, K., 2015. A hitchhiker’s guide to fast and efficient data reconstruction in erasure-coded data centers. ACM SIGCOMM Computer Communication Review, 44(4), pp.331-342.
Ruefle, R., Dorofee, A., Mundie, D., Householder, A.D., Murray, M. and Perl, S.J., 2014. Computer security incident response team development and evolution. IEEE Security & Privacy, 12(5), pp.16-26.
Torabi, S.A., Soufi, H.R. and Sahebjamnia, N., 2014. A new framework for business impact analysis in business continuity management (with a case study). Safety Science, 68, p

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 8 pages

PAY 5 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Disaster Recovery And Business Continuity. Retrieved from https://myassignmenthelp.com/free-samples/mscs2103-disaster-recovery-and-business-continuity/physical-safeguards.html.

“Disaster Recovery And Business Continuity.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mscs2103-disaster-recovery-and-business-continuity/physical-safeguards.html.

My Assignment Help (2021) Disaster Recovery And Business Continuity [Online]. Available from: https://myassignmenthelp.com/free-samples/mscs2103-disaster-recovery-and-business-continuity/physical-safeguards.html[Accessed 18 December 2021].

My Assignment Help. ‘Disaster Recovery And Business Continuity’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Disaster Recovery And Business Continuity [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/mscs2103-disaster-recovery-and-business-continuity/physical-safeguards.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

MyAssignmenthelp.com provides affordable essay help to students in Australia. Being a cheap essay writing service, we aim at providing the best in the minimum. We offer tons of freebies and a good discount for placing orders with us. All our efforts are aimed at ensuring that having a reliable and quality academic assignment help doesn’t drill hole in your pocket. Our writers draft paper from scratch, resourcing updated facts and information to be used in the paper. Exhaustive research resources are at our disposal to draft quality research papers. Some of our popular services include research paper help, dissertation help, thesis help, homework help, coursework help and class-apart works in lot other academic papers.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »