StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Incident Response, Business Continuity, and Disaster Recovery Plans - Research Proposal Example

Cite this document
Summary
The "Incident Response, Business Continuity, and Disaster Recovery Plan" paper present a case study proposal with a view to enabling organizations to implement effective response and recovery plans for business continuity. The results and recommendations of the investigation are presented…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Incident Response, Business Continuity, and Disaster Recovery Plans
Read Text Preview

Extract of sample "Incident Response, Business Continuity, and Disaster Recovery Plans"

? Incident Response, Business Continuity and Disaster Recovery Plans Incident Response, Business Continuity and Disaster Recovery Plans Introduction Many organizations have adopted and implemented information and communication technologies within their business functional areas. The increased use of technology by organizations is motivated by its advantages of efficiency, accuracy, communicability, storage, management and effectiveness of business operations (Coppola, 2006). Nonetheless, many organizations have not designed effective plans for response and recovery from possible incidences which would lead to loss of business continuity (Corrigan, 2008). It thus becomes imperatively necessary to provide evidence and research based guidelines for effective implementation of incident response and disaster recovery plans for organizations which have employed the use of information and communication technology in their operations. It is due to the increasing incidents of attacks to information systems and the related security challenges that it is necessary for organizations to achieve maximum precautionary plans for response and recovery from incidences without having any significant impact on the business processes. The lack of effective implementation of incident response and recovery plans has been caused by lack of specific approach and strategies for establishment and application of these plans within the organization. This paper presents a case study proposal with a view of enabling organizations to implement effective response and recovery plans for business continuity. Nonetheless, it is necessary to note that there are cost and time implications which are associated with the implementation of the incident response and recovery plans for the advantage of business continuity. Literature Review Many incidences of failure of business organizations to achieve business continuity after system attacks or breaches are attributed to a disorganized approach to the response and recovery from these attacks (Comfort, Oh and Ertan, 2009). It is thus argued that proper planning for the response and recovery of organizations from disasters is required for all organization and institutions (Omar, Alijani and Mason, 2011). In the light of this argument therefore, it is suitable that business organizations are guided in the proper planning of the response approaches and recovery process in cases of attacks to their information systems. The benefit of proper and organized response and recovery plan for various attacks to organizational computer systems is the reduction of the costs and time related to failure of continuity of business processes (Haddow, Bullock and Coppola, 2011). All organizations require an information system policy which provides the step by step procedure for response to attacks of the system and the recovery from possible attacks (Kuonqui, 2006). Without such a policy, businesses are likely to fail in attaining recovery from various attacks of their information systems (Jennex, 2012).Organizations often have incident response teams which help them to effectively manage various attacks to their information systems (Omar, Alijani and Mason, 2011). These teams are accredited with the role of following standard procedure for response and recovery from incidences. In this regard, the teams a significant function of protecting the organization from loss of the continuity of business processes (Kuonqui, 2006). It is notable that regardless of the postulation of information system policies as the solution to the response and recovery from incidences, there is no clear presentation of the contents of such polities. Moreover, the incident response team composition has not been defined clearly. This can be attributed to unprofessional response to attacks of organizations’ information systems (West, 1996). Additionally, actual steps which should be taken in the procedural response to an incidence and recovery from such incidences have not been provided in a distinct and accurate manner. It is thus evident that organizations require to be provided with the most appropriate approaches that they would employ in response and recovery from incidences so that damage and losses can be as minimal as possible. This endeavor can be attained through a scientific investigation on the most appropriate and practical based approach and steps of responding and recovering to possible attacks to the information systems of organizations. Proposed Work The ineffectiveness of incidence response and recovery from incidences which have been recorded in much organization has motivated the need for scientific investigation to proof how this effectiveness can be attained. Therefore, the proposed project is aimed at performing a scientific investigation on incident response and recovery which is aimed at ensuring that losses are minimized within organizations in event of incidences. In this regard, a study of sampled organizations which have implemented technology is to be accomplished. The purpose of the investigation is to evaluate the policies, approaches, procedures, policies and teams which are associated to incident response and recovery. The view of the investigation is to determine whether the organizations have implemented effective measures of ensuring that organizations achieve business continuity after incidences with minimum incurrence of costs. Through a sampling methodology, a convenient sample will be attained from organizations which have employed technology in their operations and have been affected by security incidences and breaches. Therefore a primary research methodology will be conducted to gather data and information on the approaches which the organizations selected in the sample employ in the achievement of effective response and recovery from system attacks. The investigation will also employ secondary research methodology with an aim or comparative analysis of the gathered data with the previous studies on incidence response and recovery of organizations from system attacks. Both quantitative and qualitative research designs will be employed in order to achieve and analyze both quantifiable and qualitative data on the area under investigation. Expected Results/Deliverables The results of the investigation will include both quantitative and qualitative data and information on the area of study. The policies, procedures and approaches to the incidence response and recovery comprise of the expected qualitative deliverables of the investigation. Moreover, the composition and the roles of the incidence response and management team in addition to the ability of the organizations to recover from incidences are expected quantitative results of the investigation. The cost and time deliverables on the response and recovery of the various system attacks to the organizations comprise of the expected quantitative deliverables. In additional to the findings of the primary investigation, secondary sources of information will also provide important quantifiable and qualitative deliverables for analysis, discussion, conclusion and recommendations. The presentation of the results is among the expected deliverables which will include the approaches, procedures and policies used by the sampled organization in the responses and recovery from various incidences. Additionally, the analysis of the response and recovery process will present recommendations on the most effective strategies and plans for response and recovery from attacks to information system attacks. The presentation of the results is expected to illustrate the various quantifiable data and costs which are associated with the loss of business continuity which emanates from ineffective response and recovery strategies to incidences. Work Plan and Schedule The work that will be carried out during the investigation is scheduled within a period of six weeks. During the first week, the preparation, selection of the sample organization and identification of data collection tools will be achieved. In the second week, actual collection of data both from the primary sources and secondary information resources will be done. The third and fourth week will be spent in the integration of the primary finding and the secondary sources of information and the analysis of the gathered data. Additionally, both quantitative and qualitative data and information will be integrated during the analyses. The fifth week will be for the writing of an elaborate research report which will contain the major findings of the investigation. Finally, the results, and recommendations of the investigation on incident response and recovery will be presented. References Comfort, L. K., Oh, N., and Ertan, G. (2009). The dynamics of disaster recovery: Resilience and entropy in hurricane response systems 2005-2008. Public Organization Review, 9(4), 309-323 Coppola, D. P. (2006). Introduction to international disaster management. Amsterdam: Butterworth Heinemann. Corrigan, A. (2008). Disaster: Response and recovery at a major research library in New Orleans. Library Management, 29(4), 293-306s Haddow, G. D., Bullock, J. A., and Coppola, D. P. (2011). Introduction to emergency management. Burlington, MA: Butterworth Heinemann. Jennex, M. E. (2012). Managing crises and disasters with emerging technologies: Advancements. Hershey, PA: Information Science Reference Kuonqui, C. (2006). Disaster response and recovery: Strategies and tactics for effective operations. Journal of International Affairs, 59(2), 365-367 Omar, A., Alijani, D., and Mason, R. (2011). Information technology disaster recovery plan: Case study. Academy of Strategic Management Journal, 10(2), 127-141 West, D. (1996). Technology advances raise disaster recovery stakes. National Underwriter.Life and Health, 100(4), 7 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Incident Response, Business continuity, and Disaster Recovery Plans Research Proposal”, n.d.)
Incident Response, Business continuity, and Disaster Recovery Plans Research Proposal. Retrieved from https://studentshare.org/information-technology/1450946-case-study-developing-incident-response-business
(Incident Response, Business Continuity, and Disaster Recovery Plans Research Proposal)
Incident Response, Business Continuity, and Disaster Recovery Plans Research Proposal. https://studentshare.org/information-technology/1450946-case-study-developing-incident-response-business.
“Incident Response, Business Continuity, and Disaster Recovery Plans Research Proposal”, n.d. https://studentshare.org/information-technology/1450946-case-study-developing-incident-response-business.
  • Cited: 0 times

CHECK THESE SAMPLES OF Incident Response, Business Continuity, and Disaster Recovery Plans

Incident Response, Business Continuity and Disaster Recovery Plans

The case study address Incident response, Business Continuity, and disaster recovery plans for our IT department.... However, business continuity planning is not limited to disaster recovery and incident management.... In order to achieve the primary objective of online service delivery, the organization must address and establish business continuity planning.... (I have assumed these requirements, as there is no case study) 17The additional expenses must be determined if the functions or procedures related to the business are untreatable....
21 Pages (5250 words) Case Study

Disaster Recovery Plan in Respect of Share Broking House

Uncertainty in the environment caused by natural and man-made disasters, call for a strategic management plan for business continuity and disaster recovery.... This paper "disaster recovery Plan in Respect of Share Broking House" aims to ensure normalcy in clearing and settlement operations in the business without loss of time, accessibility to staff for disaster recovery process, financial and operational support, a survey by insurance companies, etc....
8 Pages (2000 words) Business Plan

Establishing a Business Continuity Plan

In the paper 'Establishing a business continuity Plan' the author analyzes establishing BCP/DR planning and Incident response teams/planning.... It is essential for the business continuity to find out the time period before major impact on the unavailability product is experienced.... Classifying business Impacts for Interruptions or IncidentsThe disruption impact on significant services or the products helps in the verification of how long functions of an organization can work without services or products....
7 Pages (1750 words) Essay

Incident Response, Business Continuity and Disaster Recovery Plans

It thus becomes imperatively necessary to provide evidence and research-based guidelines for effective implementation of incident response and disaster recovery plans for organizations that have employed the use of information and communication technology in their operations.... "Incident Response, Business Continuity, and disaster recovery Plan" paper present a proposal with a view of enabling organizations to implement effective response plans for business continuity....
5 Pages (1250 words) Research Proposal

Critical Infrastructure Recovery Planning

disaster recovery is often unplanned for in the emergency management life cycle.... Erbschloe (2003) says that 'the enhancement of capabilities of concerned organizations to prevent, protect against, respond to, recover from, create resources and mitigate the effects of natural disasters, acts of terrorism, and other man-made disasters'disaster recovery as stated by Phillips (2009) 'is the process, policies, and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster'....
10 Pages (2500 words) Assignment

Disaster Recovery Plan in Share Broking House

This paper discusses the disaster recovery plans in respect of the Share Broking House.... The geographical locations should be dispersed with sufficient distance between the head office and the alternate site proposed for the disaster recovery plans.... The paper "disaster recovery Plan in Share Broking House" describes that in general, when the disaster management is underway, the complete authority rests with the incident response team to avoid overlapping of authorities in the implementation of the plan....
8 Pages (2000 words) Case Study

Information Security the Using Business Impact Analysis

For Automotive Paint Suppliers, serving more than 1000 customers in Western Australia, the need of coming up with incident response and disaster recovery regarding information security is an urgent issue, based on the fact that more than 80% of businesses fail if faced with any form of information attack.... Through the BIA system, APS will be able to address the aspect of incident response such as decision and detection making, identification of real threats, classification of IDS network placements among other notable aspects....
21 Pages (5250 words) Report

Disaster Management and Recovery Plan: B&C Company

First, it can help in the prevention of the significant impacts of disasters through its structures and plans.... "Disaster Management and recovery Plan: B&C Company" paper focuses on B&C Company, a company located in Hong Kong.... It engages in preconstruction activities, construction activities, life cycle analysis, speed to revenue activities, active campus planning, and economic inclusion services....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us