StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Disaster Recovery - Assignment Example

Cite this document
Summary
This assignment "Disaster Recovery" addresses security against potential and current cyber threats by presenting a structure alongside moderation systems connected with association wide security. Security structure addresses internal, external and specialized framework security. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Disaster Recovery
Read Text Preview

Extract of sample "Disaster Recovery"

Full Paper Case Study Issues After reviewing the case study, there are several high risk issues that need to be addressed i.e. The data center was last tested on 2007 that is a long time back and during this time frame; there will be several major and minor infrastructure changes that need to be aligned with the business continuity and disaster recovery plan A critical asset that has never been tested is the item processing facility. As this function contributes to a major revenue stream for the bank, it needs to be addresses and tested The crises management unit comprise of executive and senior management for taking decisions in a disaster situation, if they are not aware of how to activate the plan and declare disaster, there are good chances that the organization would suffer a substantial loss. Moreover, contingency planning will also not be utilized in a disaster situation Incident handling process is not defined in any of the official internal documents of the bank. Likewise, for any forensic investigation, logical evidence cannot be provided because the bank is not maintaining the audit trails There are no segregation of duties, for instance, administrators can delete, view and edit all system logs created by their user ID’s Backup facility responsibilities were not defined in any of the approved internal documents of the bank. Employees are unaware of how and who will perform data backup management tasks In item processing facility, backup health status are not reviewed on daily basis leading to corrupted data files, as they will serve no purpose when retrieved from the backup data center facility Security The world is getting to be modernized with advance computing processing mix in every industry. In the developed nations, integration of advance computing infrastructure is introduced for working administrations identified with E commerce, industrial and financial area. New creative incorporation of system control and data acquisition (SCADA), military safeguard frameworks, and money related frameworks work on the Internet. The discriminating framework of any nation comprises of amazingly composite, regulating toward oneself and cyber based assets which is indispensable for the countrys money related framework and supervision. It is concerned with interchanges, transportation, water supply, vitality, crisis administrations, and banking and finance. Information Technology has been developed with new research and reexaminations encouraging the discriminating base mechanized. On the other side, vulnerabilities additionally developed bringing on interruption to the basic foundation affecting in a few ways. Although there are numerous vulnerabilities, cyber-attacks are the most noticeable one. Cyber-attacks approach the focus in a non-customary manner. Because of imbalance in the military qualities, hackers assault this both the economy and the military division of the nation (Critical infrastructure protection). For tending to cyber-attacks there must be a security structure that will address internal, external and specialized framework security. This paper will address security against potential and current cyber threats by presenting a structure alongside moderation systems connected with association wide security. It could be worked with the administration or the private sector, both Networks give chances to hackers to intrude the destination remotely and take control of the capacities and assets these gadgets has. The effect of hacking in these frameworks is annihilating. For instance, hackers may obtain entrance to the military radar frameworks, charge card information stolen, information stolen from the Federal Bureau of Investigation (FBI) has uncovered secret agents and now their life is in danger and so forth. The limit of these assaults effect on the nations economy, security and financial stability. They break government systems which are straightforwardly identified with national administrations. Thousands of new cyber-attacks ordered with "Major" and "Minor" are infiltrated on the Internet every day. The center is the force part of the United States including websites of Poland, South Korea and United Kingdom. They all have seen cyber-attacks in recent months. Distinctive schools in different conditions of America have lost a large number of false wire exchanges (Fraudulent Wire Transfers Continue to Plague Community Banks 2012). Cyber-attacks are intelligent and sorted out. When the system is hacked, they install small loop openings or programming interlopers for giving hackers access at whatever point they need to get into the system once more. In straightforward words one can say that, it is a PC to PC attack to take the private data, trustworthiness or the information quickly accessible on the system. The attack embraces a figured way to alter activity against information, programming and equipment in both PCs and systems. It is vital to characterize a strong system guard for taking care of cyber-attacks. "Stuxnet" is a software program that contaminates the industrial control frameworks. The unpredictability of the virus demonstrates that it has been produced by the gathering of master hackers supported by a national government. The product does not demonstrate that it has been produced by hackers or digital crooks (Ashby, B 2011). The security specialists break the cryptographic code of the virus to look at and recognize the goal and working system. After analyzing the virus, Initial thought about the specialists were that the virus is custom-made for taking mechanical privileged insights and production line equations. The formulas can be utilized to fabricate fake items. This conclusion happened when Ralph Langner, who is a specialist of the mechanical framework security uncovered that the infection targets Siemens programming frameworks. The default usefulness of this Siemens segment screens the basic processing plant operations inside 100 milliseconds by adjusting itself to a Siemens discriminating part. The "Stuxnet" infection can result in a refinery centrifuge to break down. This is not the end as it can assault different targets too. For giving electric force from the power producers, the information identified with transmission and appropriation needs to be imparted between them. With a specific end goal to convey, a system with distinctive conventions containing the Quality of Service (QoS) is executed. The base of the oil and electrical industry is constructed to give execution instead of security. The software on which these hardware works takes after an exclusive standard accentuating on usefulness as opposed to the security. To meet the demands power grids are developed and installed. The automatic system for oil and power industry was generated through modern ways. The data security features were designed for the information systems. Literature Review Financial institutions are influenced by Trojans more than some other area. The needs for selecting money related organizations are the exchanges which are directed on the web. The targets of programmers are to take the credentials of the online customer. That is the reason the money related organizations got the most Trojan assaults in 2005, 40% among the other fifteen divisions. The information is the blood life of each association; unequivocally money related establishments lead their business on the web. "Phishing" demonstrates the fake personality of the site and gather the qualifications from clients on the web. This is a business misfortune and additionally the negative effect of the client with respect to the associations trust. 33 individuals were gotten in "Operation Phish Phry". Two million dollars were stolen from the bank accounts within 2 years time. The site of "bank of America" was spoken to as a fake reproduction and the clients were incited to enter ordered credentials to take cash from that point account on the web. Financial impact effect includes the robbery of associations discriminating information which is additionally called business data. This is a discriminating risk on the grounds that the associations bear more cost for the missing information when contrasted with the online misrepresentation of Master cards. The business robbery depicts a serious harm to the associations, they lose their business, they lose their clients, and their vicinity in the worldwide economy. Technical System Security Before characterizing the security construction modeling or procedure, one question each association must ask itself i.e. why I require data framework security. In the wake of distinguishing the reason, there is a necessity of distinguish shortcomings or vulnerabilities alongside effect and sorts. Associations need to consider the secondary passages and the week points that may permit or trigger any dangers to disturb business operations by bargaining a benefit or data framework. Before describing the security development demonstrating or strategy, one question every affiliation must ask itself i.e. why I oblige information system security. In the wake of recognizing the reason, there is a need of recognize inadequacies or vulnerabilities close by impact and sorts. Affiliations need to consider the optional entries and the week focuses that may allow or trigger any threats to aggravate business operations by bartering an advantage or information system. Modification is connected with changes in information or modification in information with or without reason. This adjustment can be performed by a worker or by programming too. Successful change administration and design administration systems alongside documentation are the best controls for minimize security vulnerabilities that may emerge from contrary modules or equipment adjustment from the framework. Destruction Obliteration is connected with physical harm to an equipment gadget, system gadget or programming. Demolition of an equipment or system gadget incorporates spilling of water, insufficient arrangement, voltage varieties and so forth. While, programming obliteration can be from a malicious code, Trojan or unexpected cancellation of a piece of any application and so forth. So also, information can likewise be erased purposefully or unexpectedly and can likewise because by malfunctioning device. Revelation of information is relative to confidentiality i.e. needed to know premise. Information is anything but difficult to be stolen on the grounds that the first duplicate still appears to be in place, regardless of the information theft. Information sorts can be ordered into numerous sorts, again relying upon authoritative prerequisites. Case in point, prized formulas, up and coming monetary results or long haul vital arrangements of the association can be delegated top mystery, while, client data can be named classified. Associations conducting business online gather client data through sites. Information can likewise be blocked by unapproved access to figuring and electronic assets. Also, unapproved remote can likewise bring about getting to data from a remote area. Intrusion can likewise cause framework accessibility that may come about because of broke down equipment or force blackout. Also, interference of administrations can likewise be brought on from show storm or system clogging that may cause dissent of administration. Lastly, fabrication alludes to an infiltration of transactions to a database. Manufacture is regularly directed by unapproved gatherings in a manner that is hard to recognize the legitimate and manufactured exchange. One of the cases of fabrication is called as Phishing. Notwithstanding, keeping in mind the end goal to execute specialized framework security, encryption is the best control up till now for averting trustworthiness of information. Encryption typifies the information by figuring it to an alternate structure by open and private key encryption. Similarly, asymmetric and symmetric encryption procedures are considered according to prerequisites. Besides, non-denial can be counteracted by outsider testament powers. Formal System Security Management of data framework security obliges an improvement of authoritative structure and procedures for guaranteeing sufficient assurance and uprightness. Moreover, for keeping up sufficient security, a suitable relationship association is needed for keeping up trustworthiness of parts and obligations. Additionally, a noteworthy methodology and strategy is obliged to keep up and oversee data framework security. However, information system security wont be compelling if the association does not understand that data security must be considered as a top level administration obligation. In like manner, data security administration must be determined by the top managerial staff and must be adjusted to corporate administration. As, it is the obligation of the board of directors, if a top down methodology is not took after, there will be no powerful security administration inside the association. Besides, considering data security exclusively as a specialized will bring about a disappointment of a data security program. As specialized controls can just avert dangers and vulnerabilities by means of a particular arrangement of specialized arrangements, there is a necessity of data security administration that will show the execution and estimations of security measurements. A portion of the cases incorporate dashboard, adjusted scorecards and so forth. that will demonstrate the present and obliged data security condition of the association. Be that as it may, executing data security administration at the top level cant resolve issues, as it is a multi-dimensional order. This is on the grounds that data security administration is a complex issue that must be looked into and kept up on an occasional premise. Additionally, effective risk administration ought to be set up so association insightful dangers are distinguished so as to make a successful data security administration arrangement. Associations must keep up a base adequate standard that will be considered as the suggested best data security administration rehearses. Then again, corporate data security implementation is vital that will go about as an administration control and characterize reason, scope, proprietorships, guidelines, design necessities, and requirement alongside amendment history. Similarly, this approach will exhibit complete points of interest and will incorporate all parts of securing data of the association. Besides, despite data security administration, hazard administration, approach and arrangement authorization, client mindfulness is vital. As danger environment is continually changing, each representative must be mindful of practices viable strategies for data security. A comprehensive preparing and mindfulness program by NIST address three levels of clients i.e. learners, moderate and experts. Every gathering is tended to by modified client mindfulness preparing sessions that additionally incorporates PC based testing environment (Mont, J.2015). Informal System Security Informal framework security bolsters the formal framework security commonly inside the association. Formal frameworks cant be workable alone unless workers acknowledge them. Similarly, client acknowledgement is specifically connected with client acknowledgement. For example, if a biometric participation framework is introduced as a physical security control, client acknowledgement is essential or else, the control wont be successful. On the other hand, the seriousness level of a improper informal system is not high as compare to formal and specialized security. It is an essential idea that people are impervious to change. Few of the samples for components that may acquaint issues with data security administration are:  department is becoming automated  deployment of an ERP  changes in administration  changes in reporting In the above mentioned samples, there is a plausibility that a large portion of the workers may empower changes and some may not. Be that as it may, to address these issues is significantly in light of the fact that if a worker is repulsing to change, there is a plausibility that he/she may handle data security methodology insufficiently, bringing about a prologue to security hazard for the association. Albeit, preparing sessions must be led focusing on gathering of individuals to minimize these issues. If the organization is a financial institution, aims to provide quality of service and gaining competitive advantage then the hot site is the most preferable option for our organization. This will minimize the downtime for internal staff along with the service outage of the customers. Likewise, the hot site will provide instant failover from the primary to the secondary site, after the activation of the BCP plan and disaster declaration. As the bank relies on technology, the replicated site may incur cost initially but will provide return on investment, a positive security posture and high availability of systems and resources. Moreover, compliance of Sarbanes Oxley Act, securities act and security exchange act is mandatory, as the bank is bound to safeguard investors and public funds and the regulator also assure compliance of these standards by performing external audits. The controls for ensuring transparency may incorporate security incident event management on financial applications and production tables. A use case scenario can be developed with correlations and triggers on transaction types and limits can be generated for prevention of fraudulent activities. As per NIST Special Publication 800-53, four controls are essential i.e. Security Control CP-2, CP-2.1 Assessment Procedure, CP-2.2 Assessment Procedure, AC-2(4) Account Management. CP-2 will be implemented for assuring correctness and validated information in the BCP/DR document CP- 2.1 will be implemented for a periodic review of the BCP/DR for keeping them up to date CP-2.2 will be implemented for assuring an effective incident management, document reviews, testing of BCP/DR and complying with the regulators requirement AC-2(4) will be implemented for segregation of duties between a maker and a checker Further, there is a requirement of establishing specifications, mechanisms, activities, and individuals, as these parameters will address the data backup management roles and processes within the bank. Moreover, there is also a requirement of establishing an updated business continuity and disaster recovery plan. Likewise, many factors needs consideration in the preliminary phase and may also lay the foundation for the plan. The first milestone is to develop a risk management plan that will also incorporate identification and classification of assets. Conclusion Controls from NIST special edition have been discussed with rationale. Likewise, the gaps from the case study have been identified and controls are selected for the same. Different regulatory acts have also been discussed and a measure for making their compliance is also debated. Moreover, rationale for cost, resource management, type of contingency site and security posture is reflected in the controls. For tending to potential and current digital dangers, we have spoken to a system. The three frameworks i.e. formal, casual and specialized, and their coordination, exhibited specialized, administration and human collaboration and administration variables. On the other hand, in ensuring information and data in an association is a collaborative effort i.e. specialized frameworks goes about as a center, including all the specialized perspectives, formal frameworks going about as an administration perspective and casual framework managing human component. The following area will address issues and acts identified with information protection and assurance. References Ashby, B. (2011). Stuxnet: A Disaster Waiting to Happen. Industrial Heating, 78(9), 14. Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors: GAO-03-233. (2003). GAO Reports, 1. Fraudulent Wire Transfers Continue to Plague Community Banks. (2012). Illinois Banker, 97(8), 19. Mont, J. (2015). NIST Framework Is a Crucial Cyber-Security Tool. Compliance Week, 12(133), 53-58. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Disaster Recovery Assignment Example | Topics and Well Written Essays - 2750 words, n.d.)
Disaster Recovery Assignment Example | Topics and Well Written Essays - 2750 words. https://studentshare.org/information-technology/1864314-various
(Disaster Recovery Assignment Example | Topics and Well Written Essays - 2750 Words)
Disaster Recovery Assignment Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/information-technology/1864314-various.
“Disaster Recovery Assignment Example | Topics and Well Written Essays - 2750 Words”. https://studentshare.org/information-technology/1864314-various.
  • Cited: 0 times

CHECK THESE SAMPLES OF Disaster Recovery

Disaster Recovery & Humanitarian Assistance

The first one to come to mind is the chapters on direct preparedness for disaster relief.... It really showed me just what it would be like to be in disaster Relief, which is something I have considered for some time.... Helping people is something I have always enjoyed doing....
2 Pages (500 words) Essay

Business Disaster Recovery

This research aims to present the case study of a company and to gather sufficient information about Disaster Recovery in the company; it was found that there must be a detailed discussion with some person who can provide required authentic information with full responsibility.... hellip; The main objective of the dissertation was to study the importance of business Disaster Recovery for the businesses and finding some practical evidences from the business world to get a deep insight over the issue and to understand that how the companies can effectively manage their Disaster Recovery process through strategic planning and precautionary measures The topic of the research has also been recognized by the researchers and social scientist as an important issue for the business so there was lot of literature present at different resources around the topic that cover the topic from different aspects....
6 Pages (1500 words) Essay

Providing Reliable Security Services to the Company

The proposals, which I have submitted to prevent disruption to the computing environment and to… Development of a Disaster Recovery plan can help the company recover important data and files in case of any mishap.... All issues related to data security need to be addressed in Disaster Recovery plans in Computer Sciences and Information Technology Being designer distributions' security consultant, it is my legal obligation to provide reliable security services to the company....
2 Pages (500 words) Essay

Principles of Database Design

Business continuity and Disaster Recovery refer to the contingency plans and measures designed and executed by a business to guarantee operational flexibility in case of any service interruptions.... As information technology systems have become the focus of all areas of business,… A Business Continuity Plan identifies a business' vulnerability to both internal and external threats and manufactures soft and hard assets that offer efficient prevention Principles of Database Design Principles Of Database Design Disaster Recovery and Business Continuity Plans Business continuity and Disaster Recovery refer to the contingency plans and measures designed and executed by a business to guarantee operational flexibility in case of any service interruptions....
2 Pages (500 words) Essay

Advanced bubble Wicked problem: Disaster recovery and housing shortages

Both refugees and disaster responders can use them.... It causes displacement of people and makes a lot of places inaccessible.... For this reason, it is necessary to come up with equipment that can be used in areas that are inaccessible because of flooding.... Advanved Bubble… People offering rescue efforts would also be able to use the equipment in their service to the people....
4 Pages (1000 words) Essay

Disaster Recovery - a Risk Management Approach to Business Continuity

This paper "Disaster Recovery - a Risk Management Approach to Business Continuity" focuses on the fact that Disaster Recovery (DR) and Business Continuity (BC) form the basis of risk management in most organizations, especially those that engage Information Technology in their operations.... hellip; Disaster Recovery Planning (DRP) compliments Business Continuity Planning (BRP) to ensure that the organization continues with its operation in the aftermath of human-induced or natural disasters....
1 Pages (250 words) Assignment

Business Continuity and Disaster Recovery Planning

Example The above-stated conceptions can be better understood with the example of improving system along with process resilience in relation to a 'disaster recovering planning' project.... The writer of this paper states that 'Running business continuity' is defined as the procedure of maintaining and recovering a particular business from any damage....
1 Pages (250 words) Assignment

Disaster Recovery and/or Business Continuity Plan

Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan.... Computer Security is applied to Cyber security Disaster Recovery and Business Continuity Cyber security is a process of applying security measures to ensure data availability, its confidentiality and also its integrity as a plan for Disaster Recovery and Business Continuity Plan....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us