StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Business Continuity Plan - Assignment Example

Cite this document
Summary
The primary aim of this paper “Business Continuity Plan” is to create a plan to accord the White House security staff the necessary support concerning resources, intelligence and information. It is evident that such resources are critical when deterring any breach of security and potential emergency…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Business Continuity Plan
Read Text Preview

Extract of sample "Business Continuity Plan"

Project 4: Business Continuity Plan Project 4: Business Continuity Plan Plan Introduction Plan Purpose The primary aim of thisplan is to accord the White House security staff the necessary support concerning resources, intelligence and information. It is evident that such resources are critical when deterring any breach of security and potential emergency incidents that may disrupt normal white house business. Examples of such incidents include cyber-attack, natural calamities, hostile situations and intruder invasion. Plan Objective The plan to be formulated and implemented is expected to provide White House security staff with varied possible options that would ensure that the emerging situations are adequately managed. The objective of the plan is to ensure that the functionality of critical White House business is not disrupted and the quick resumption of normal White House business is restored. Plan Scope The plan formulated and implemented is specifically designed for the White House security staff. The staff is meant to ensure security of the White House is not breached. Plan Scenario Numerous possible scenarios may interfere with the security and normal functioning of the White House. Some of them may include: 1. Natural Calamities Examples include: Floods and Storms 2. Inadequate employees The inadequacy may be due to sickness and injuries, staff strikes or go slows, resignations and retrenchments. 3. Security Breaches Possible incidences include: intruder invasion, cyber-attacks and loss of data and hostile invasion among others. 4. Deficient Infrastructure Possible incidences include power outages, network outages and telecommunication equipment breakdown. Plan assumption The following assumptions will be made subsequent to the implementation of this policy: 1. Sufficient security personnel will be available at any given time at the expected assigned posts 2. An appropriate evacuation procedure will be in place in the event of possible security breach and onset of natural calamities. 3. Backup power generators and network boosters will be available at any particular moment. In the departments not affected, power and network should be maintained. 4. A data breach response team equipped with up to date strategies should be available when needed. Plan Section Recovery Strategy Summary The strategies to be undertaken are expected to neutralize the consequences of the scenarios. With each scenario, a specific recovery strategy is to be assigned to help the White House security staff to react adequately. Some of the recovery strategies to be utilized include upgrading of cyberspace security, enhanced security services, backup infrastructure and security staff. However, services are expected to continue in the unaffected departments. Recovery Tasks Upgrading Cyber Security The digital world has provided hackers with an avenue to access classified White House documents and information. It is critical to ensure that relevant websites and databases with relevant information are hack-proof. Hackers usually use Trojans, security misconfiguration through file upload, unaltered default settings, use of third parties like suppliers and rogue employees (Sungard Available Services, 2015). Several strategies can be used to enhance cyberspace security. Enhancing cyber security involve Testing cyber security policy The process of testing cyber security policy involves testing the credibility of the security measures regularly to expose their vulnerability. For instance, vulnerability assessment, firewall and VPN services, Managed Intrusion Detection and Prevention Services and Managed Network IDS are useful. Through this, adequate monitoring and reporting on any suspicious activities will be revealed. A response team that responds to any threat should be available (Sungard Available Services, 2015). Establishing Working Relationship Different departments that utilize internet services should occasionally interact in order to have an in-depth understanding of their roles and responsibilities. The approach will create the needed teamwork response to any possible threat (Sungard Available Services, 2015). Elevate Awareness of Forensics The White House security staff should go through a tutorial on how forensic investigation firms conduct their investigations procedures so that they may not undertake actions that may aid hackers evade the relevant investigating authorities (Sungard Available Services, 2015). Gaining Greater Organization Credibility Cyber-attacks have the ability to cause organization confusion. It is necessary to conduct cyber security breach drills to accustom the various departments on its defining aspects and their response (Sungard Available Services, 2015). Enhanced Security Services It is mandatory for the security staff to formulate strategies capable of deterring and neutralizing possible invasion cases with the White House prone to possible individual and hostile invasion. As the residence the most powerful leader in the world, probabilities of possible invasions are high. In order to enhance White House Security, several measures have to be undertaken. Increased foot patrols Increased surveillance especially around the executive mansion Expansion of the perimeter around the White House Increase of tactical and non-tactical assets around the White House Proper evacuation procedures Tutorials of the evacuation procedures to the White House staff Deficient Infrastructure and Insufficient Staff Personnel Infrastructure such as disruption in network and breakdown of telecommunication equipment pose a danger of interfering with the operations of the White House. The situation can also lead to security threats. Absence of staff either through sickness and injuries would mean certain services would not be availed. To counter this, several strategic undertakings have to be implemented that include Having a rapid response unit that is equipped with necessary skills and equipment to restore any network disruptions Internal secure network in the various critical departments Having part time and standby employees to cover for their missing colleagues. The chief of security collaborating with the relevant security departments will make the approach possible. Backup generators that power immediately outages occur. Recovery Personnel The recovery strategies will be placed under the stewardship of the following department heads. Chief of Staff Head of Security Chief Information Security Officer Plan Timeline Immediate reporting of any identified breach or suspicious activities to the relevant department. The concerned response team are to be notified and engaged. Necessary response strategies are to be undertaken under the stewardship of the relevant head of department to neutralize the threat and restore normalcy (Sungard Available Services, 2014). Critical Vendors and their RTOs Recruited security firms such as Sungard Available Services play influential roles (Sungard Data Systems Inc). The firm is to ensure proper cyber security strategies are enacted and a well-functioning secure network. Critical Equipment/ Resources Standby Generators Workstations such a response strategy center Conference rooms Computers (both with and without VPN access) Evacuation facilities/ centers Surveillance equipment References Sungard Available Services. (2014). The Building blocks for a Successful Recovery Program. Sungard Available Services. Sungard Available Services. (2015). Anatomy of a Cyber Security Hack. Sungard Available Services. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Business Continuity Plan Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Business Continuity Plan Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1700381-business-continuity-plan
(Business Continuity Plan Assignment Example | Topics and Well Written Essays - 1000 Words)
Business Continuity Plan Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1700381-business-continuity-plan.
“Business Continuity Plan Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1700381-business-continuity-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Business Continuity Plan

Establishing a Business Continuity Plan

In the paper “Establishing a Business Continuity Plan” the author analyzes establishing BCP/DR planning and Incident response teams/planning.... It is essential for the business continuity to find out the time period before major impact on the unavailability product is experienced....  Classifying business Impacts for Interruptions or IncidentsThe disruption impact on significant services or the products helps in the verification of how long functions of an organization can work without services or products....
7 Pages (1750 words) Essay

The Importance of Having a Business Continuity Plan

The paper "The Importance of Having a Business Continuity Plan" states that a Business Continuity Plan (BCP) describes an organization's capability to prepare for disruptions in business and also respond to them as endorsed by the management (Dimattia, 2001).... Threats to a business organization that calls for BCPs can arise from, for example, natural disasters, internal threats (such as sabotage), crime and even hackers.... Failure to implement these strategies means an organization will not be able to restore its critical services seamlessly following a disruption and may result in the closure of the business....
1 Pages (250 words) Essay

Disaster Recovery and/or Business Continuity Plan

Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan.... Computer Security is applied to Cyber security Disaster Recovery and Business Continuity Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan....
2 Pages (500 words) Essay

Business Continuity Plan and Continuity of Operations Planning

The paper “Business Continuity Plan and Continuity of Operations Planning” seeks to evaluate the aspects that a business needs to take care of like procedures, processes, decisions, and activities so that a business can continue operating during turbulent times.... The Business Continuity Plan that is prepared has to undergo a testing and exercise process to ensure that it will perform as expected.... ccording to Business Continuity Plan (Version 2....
12 Pages (3000 words) Research Paper

Business Continuity Plan for ASDA UK

The paper "Business Continuity Plan for ASDA UK" gives detailed information about ASDA that is the name of a cheaper supermarket chain in the UK.... Being the second-largest supermarket chain in the UK, ASDA has got a perfect and well elaborate Business Continuity Plan....  Before going into the details of the Asda Contingency plans and business continuity planning, it is necessary to conceptually clarify the term of emergency and business continuity planning....
10 Pages (2500 words) Case Study

Business Continuity Plan for Northwest Ambulance Services

The author of the current paper "Business Continuity Plan for Northwest Ambulance Services" tells that there are three general levels of continuing service that can be considered when making a Business Continuity strategy, and these depend on how critical each activity is.... NWAS, therefore, must have a Business Continuity Plan that satisfies NHS requirements to ensure continued service.... (Business Plan 2008/2009, 2008) The Business Continuity Plan must answer not only the need for these workers to be able to do their jobs of helping patients effectively but also maintaining their livelihood....
12 Pages (3000 words) Case Study

Business Continuity Plan for Boots Pharmacy

 The aim of the paper "Business Continuity Plan for Boots Pharmacy" is to devise a Business Continuity Plan for one of the biggest Pharmaceutical companies in the U.... In addition to adding reliance, the other contributions of the development of a Business Continuity Plan to an organization include aspects such as restoring the ability of an organization to supply essential services, increasing the capacity to manage disruptions that may affect the business, and assisting in complimenting of the process of risk management (Doughty 2001)....
13 Pages (3250 words) Case Study

Business Continuity Plan for Unity Fast Food Kiosk

… The paper "Business Continuity Plan for Unity Fast Food Kiosk" is a good example of a case study on management.... The paper "Business Continuity Plan for Unity Fast Food Kiosk" is a good example of a case study on management.... As much as it may seem normal to expect risks in business, it is necessary for the business to come up with means possible to address and be able to tackle risks that may occur to the business, this is the point where the Business Continuity Plan comes in to help in handling risks affecting the business....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us