1. Trang chủ
  2. » Luận Văn - Báo Cáo

btec level 5 hnd diploma in computing unit 5 security 5

68 1 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 68
Dung lượng 8,91 MB

Cấu trúc

  • I. DISCUSS RISK ASSESSMENT PROCEDURES (11)
    • 1. Definition of security risk assessment (11)
    • 2. How to do a risk assessment (13)
    • 3. Definition of asset (17)
    • 4. Definition of vulnerabilities (18)
    • 5. What is a Threat? (19)
    • 6. Explain the risk assessment procedure (21)
    • 7. Risk identification step (25)
  • II. EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN (29)
    • 1. Define data protection (29)
    • 2. Data protection process in “Wheelie good” (29)
      • 2.1 Personal information document categories (31)
      • 2.2 Conduct a risk assessment for categories of the company (32)
      • 2.3 Decide on risk treatment (33)
      • 2.4 Implement security data for “Wheelie Good” (33)
      • 2.5 Measures to protect employee data in the company (34)
      • 2.6 Review security of personal data (35)
    • 3. Why are data protection and security regulations important? (35)
  • III. DESING AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION (0)
    • 1. Define a security policy (37)
    • 2. The elements of information privacy policy (39)
      • 2.1 Purpose (39)
      • 2.2 Audience (39)
      • 2.3 Data classification (39)
      • 2.4 Authority and access control policy (41)
      • 2.5 Policies for access control and permissions (41)
      • 2.6 Security awareness sessions (42)
    • 3. Give the most and that should exist creating a policy (43)
      • 3.1 Identify duplicate policies (43)
      • 3.2 Consider the necessity (44)
      • 3.3 Use proper terminology (44)
      • 3.4 Policy maintenance duty definition (45)
      • 3.5 Configure the policy library (45)
      • 3.6 Procedures for dealing with exceptions (45)
    • 4. The step to design a policy (45)
      • 4.1 Identify (45)
      • 4.2 Analysis of security risks for each asset (46)
      • 4.3 Security requirements analysis (47)
      • 4.4 Develop a security plan (47)
      • 4.5 Training Employee (47)
      • 4.6 Write it down (47)
      • 4.7 Establish and enforce the regulations (47)
    • 5. Implementation of the policy (48)
      • 5.1 Preparation (49)
      • 5.2 Identify (50)
      • 5.3 Contain (51)
      • 5.4 Dedicate (51)
      • 5.5 Recovery (51)
  • IV. LIST THE MAIN COMPONENTS OF AN ORGANIZATIONAL DISASTER RECOVERY PLAN, (53)
    • 1. What is the definition of business continuity? (53)
    • 2. Components of recovery plan (54)
      • 2.1 Scope (54)
      • 2.2 Organization’s responsibility (55)
      • 2.3 Business functions and tolerance for downtime (55)
      • 2.4 Important procedures and strategies (55)
      • 2.5 Communication plan (55)
      • 2.6 Schedule tests, reviews, and improvements (56)
    • 3. Required steps in disaster recovery process (57)
      • 3.1 The key activities of “Wheelie Good” project (57)
      • 3.2 Assessment of disaster scenario (57)
      • 3.3 Create a communication plan (57)
      • 3.4 Plan for data backup and restoration (58)
      • 3.5 Test Plan (59)
    • 4. Some of the policies and procedures that are required for business continuity (59)
      • 4.1 Create a strategy and define goals (59)
      • 4.2 Business Continuity Planning (60)
      • 4.3 Perform a business impact analysis (61)
      • 4.4 Determine crucial business area (61)
      • 4.5 Plan to maintain operations (61)
      • 4.6 Examine and determine ongoing program maintenance (63)

Nội dung

Definition of security risk assessment Information security risk is defined as existing system flaws that can be exploited to steal sensitive data.. The five categories of risk assessmen

DISCUSS RISK ASSESSMENT PROCEDURES

Definition of security risk assessment

Information security risk is defined as existing system flaws that can be exploited to steal sensitive data The dangers are also substantial, with a wide range of potential occurrences wreaking havoc on a company's brand and finances

The overarching goal of such risk evaluations is to improve worker safety New steps or stages are added to the process, current steps, tools, and equipment are modified, or new dangers develop Auditors consider risk while developing audit processes for businesses Here are some examples of common risk assessments: Supervisors at workplaces and schools conduct workplace risk assessments to ensure that there are no health and safety hazards This review will also help to increase productivity and employee morale.

How to do a risk assessment

Before beginning the auditing process, we should identify the scope of the audit and the resources required to complete it The five categories of risk assessments listed below are required to begin the risk assessment process, particularly the scope of the review

We must follow a variety of steps while doing a risk assessment to completely investigate the process of threats, vulnerabilities, and potential risks that may damage the project in the future They delivered it A risk assessment program should contain the following stages: a) Identify:

In the first phase, we determine the scope of the evaluation, as well as the urgent priorities and dangers In the "Wheel Good" appraisal, valuable assets will include:

Step one involves assessing and listing the identified risk list Following that, we will conduct a thorough examination of the highlighted hazards To evaluate the amount of risk, we must first determine the chance of occurrence and the potential severity of "Wheel Good" security assaults The hazards should be evaluated using the following criteria:

• System failure: obsolete equipment, outdated technologies

• Natural catastrophes include fires, earthquakes, floods, and other natural calamities

• Human error: inexperienced and sensitive personnel

• Unauthorized behavior: A hacker may take a computer, erase data, or

And the risk matrix, as illustrated below, is a good tool

Figure 2 Risk Assessment Matrix c) Control:

Control mechanisms will be the next stage in properly controlling dangers To eliminate common dangers, conventional controls such as codes of practice, guidelines, and standard operating procedures can be utilized If we are unable to eliminate regulatory or high risks, we must use a "ladder of control" and a mission analysis or statement of procedure Employment that poses no risk The constraints might be set in decreasing order of efficacy A "Decentralized Control System" is what this is Personal protection equipment, for example, is the least effective measure since it just reduces the risk, but PPE is the most effective because it eliminates the risk Substitution and isolation, when combined with an engineer, are both equally efficient techniques A single concern is that you will frequently need to employ numerous controls

After the steps have been implemented, reassess the degree of risk You may not always have complete control the first time If the new level of risk remains too high, go back, and take further steps before reevaluating We may pick which risk-reduction methods to employ based on the risk matrix Finally, the threat's extent, fragility, and impacts must be appropriately depicted.

Definition of asset

The data and critical IT-related equipment or components of an organization's systems are referred to as information assets in the IT sector Include personal details This information should be as accessible and usable as possible to prevent hackers and illegal information theft For physical files, it will be the filing cabinet where the data is maintained.

Definition of vulnerabilities

A vulnerability is a weakness in a system's code that may be easily exploited and seriously jeopardizes the integrity and availability of security There are several techniques for exploiting vulnerabilities The term

"error" refers to what remains after these mishaps While faults do not necessarily constitute a threat, many of them can be exploited by malicious actors, which is known as a vulnerability Vulnerabilities can be exploited to compel software to perform activities for which it was not designed, such as gaining information on current security mechanisms.

What is a Threat?

A threat is essentially a bad action or situation that has the potential to bring harm to an organization, such as theft or illegal access They represent a huge risk to the business, threatening security's integrity and availability It can also be caused by active administrative errors such as staff error, a technological issue, or an assault

The threat identification process is a continuous and continuing activity that checks for security vulnerabilities and potential system breaches throughout the life of a project When dangers are detected, we may fix them and prevent unauthorized external access Project activities such as programmatic and technical meetings, risk analysis, risk planning, communication, and evaluation highlight new and existing dangers in the project Lessons from the database are also useful for identifying possible hazards When this happens, it must be documented and analyzed in the database

Threat Meaning/Example Related Security Assets

Spoofing identity Using another person's password to gain illegal access Authentication DDoS

An attack in which a server is flooded with internet traffic to prevent people from accessing

Availability online services and websites that are linked to it

The most common and severe instance of this is an ordinary user gaining root access Authorization

The user has the option to refuse to complete an activity, such as transmitting or receiving data

Data can be edited while it is at rest or being sent across a network

When data is at rest or being sent over a network, it can be modified

Explain the risk assessment procedure

The risk assessment process's goal is to identify hazards and estimate the risks associated When doing a risk assessment, it is critical to consider and be guided by objectives such as:

• Determine the best ways for removing hazards or reducing risks

• Set priorities for your resources

Before undertaking any activity or assignment, a complete risk assessment should be performed in order to successfully eliminate, reduce, or mitigate any dangers to health, safety, and well-being Once completed, the risk assessment should be evaluated on a regular basis, especially if the existing assessment is no longer valid or if the operation or mission has changed significantly

In general, any potentially hazardous conditions and the appropriate safeguards for the hazard or risk To guarantee the identification of all potential threats:

• Repair and maintenance are instances of irregular operations

• Examine how work is organized and completed

• Consider any unusual or anticipated conditions

• Determine if the product, machine, or equipment might be changed deliberately or inadvertently

• Consider the danger to tourists or the public

The following sample table may also be used to graphically show hazards

Mission Content Hazard Risk MoSCoW

Inexperienced Staff There will be several security flaws Must Have Inadequate Equipment

Errors or delays may occur during security patching

Must have a larger security assessment unit handle

Risk identification step

Risk identification is the process of detecting and analyzing hazards to a company's operations and staff For example, risk identification may entail searching for potential bad events like as accidents, natural disasters, and IT security risks such as malware and ransomware Stop operations, corporation Firms with strong risk management practices are more likely to mitigate the impact of risks when they occur

The process of risk identification and management is divided into six major stages The following steps were made to recognize such danger: i Identify the hazard:

We will thoroughly evaluate the entire website for any hazards and concerns that must be addressed We will highlight possible hazards that the company may face, such as natural disasters, floods, or technical difficulties We'll pay specific attention to processes or activities that might be harmful to the organization, such as objective and arbitrary work, personnel, or maintenance phases ii Identification of victims and solutions:

As we look around our business, we examine how business operations or external variables may harm your personnel Consider who would be harmed if each of the dangers you outlined in step one came true iii Risk assessment and precautions:

Following the completion of the preceding procedures, we will have a list of potential hazards, their likelihood of occurrence, and the severity of the consequences if they occur Using the risk assessment data, we may decide which degree of risk to prioritize first iv Record detected risks:

Risk notes will be kept, and they should contain the termites discovered as well as the external elements that impact the risk, such as human and behavioral factors This remark must have the following information:

• Figure out who will be impacted

• Address and control evident dangers

• Precautions are being made to mitigate the risk

• Involve your staff in the process v Review and update:

To eliminate needless risk, assessments will need to be evaluated numerous times by another individual, and the risks to the company will constantly need to be updated on a frequent basis.

EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN

Define data protection

The process of safeguarding information and data against loss, intrusion, or injury is known as data protection They are legally controlled and can only be used for lawful purposes It includes data management and data availability deployments, as well as operational data backup and business continuity/disaster recovery (BCDR) A data leak has severe consequences for the firm Because the majority of organizations are now controlled by primary books or data privacy legislation, failure to maintain data security may result in monetary loss, a loss of consumer confidence, and legal liability Furthermore, data protection strategies may be classified into three types (Imperva,2022):

• Data security: protect data from purposeful or unintended harm

• Data Availability: Quickly recover data in the event of damage or loss

• Access Control: Ensure that only those who need the information have access to it.

Data protection process in “Wheelie good”

General Data Protection Regulation GDPR was created at a period when there were many requirements – and worries about information security; equal responsibility would be assigned for data control and data processing The GDPR will safeguard information such as online data

We will suggest the Designated Organization Management System, which meets GDPR regulations while also emphasizing the secure management of personal information within the organization

The first stage in the data protection cycle is identifying the various kinds of personal data We will gather lists of personal data as a software consulting firm and create a processing history or list of processing activities We'll look at controller and CPU possibilities If we are the controller, our software security firm will determine the purpose for data processing Furthermore, as indirect data processors, we process the data in line with the client's request We will have a data processing category that includes:

2.2 Conduct a risk assessment for categories of the company:

We processed personal data that was previously included in the "Wheelie good" company The following step would be to conduct a risk analysis for each portfolio, which may comprise processing activity records and processing activity type information Risks to personal data will be identified as part of this risk assessment, and their level of risk will be established based on their likelihood and possible impacts on the firm

We will focus on dealing with high and unacceptable threats after the company's security organization

"Wheelie good" has done a preliminary assessment of the hazards The organization will implement security steps to reduce the risk to a reasonable level In terms of GDPR, we have the following options:

• Technological safeguards include data encryption, backup, and infrastructure monitoring

• Organizational measures: Define information security management mechanisms and train personnel on them

• Contractual measures: When utilizing other firms' services to handle data, employees are expected to regulate how other organizations deliver services or goods

2.4 Implement security data for “Wheelie Good”:

We will now focus on minimizing risk by protecting personal data using a range of methods, including monitoring and measurement, as well as a specialized operational management plan appropriate danger The following list contains examples of the major components

Protect your hard disks, server storage, and cloud services using encryption

Encrypt all your communication channels

Monitoring of information and communication technology (ICT) infrastructure

In terms of the personal data privacy policy

Handle all security events and accidents

Inform persons about the handling of their personal data

Contracts with workers involving the processing of personal data should be amended

2.5 Measures to protect employee data in the company:

Following that, we will improve employee access to firm data The goal is to ensure the safety of system operations Plans for operational management will be developed on a regular basis, and implementation will be assigned These tasks will be handled by IT system administrators As part of the operations management process, I will implement risk control measures from the approved Risk Treatment Plan

2.6 Review security of personal data:

This is the final phase, in which we will execute monitoring activities, assess the efficacy of the information security management system in relation to security objectives, and provide a management review report They will be aided by fundamental variables such as:

• Verify that all Operations Management Process tasks have been done

Auditing is performed at both the technological and organizational levels

• A summary of security incident response

• Once a year, a management review meeting is held

After reviewing the complete data security process, we will resume its life cycle and concentrate on maintaining and updating ISMS.

Why are data protection and security regulations important?

To ensure the security of its information is working properly, the company "Wheelie good" must implement a data protection strategy The GDPR is crucial because it protects an organization's data against phishing and hacker attacks Data security becomes increasingly important as data traffic increases Organizations must actively protect their data and maintain their security procedures up to date

"Wheelie Good" management will make decisions based on data from the company's financial accounts, client information, and product records Our employees will implement work processes to deliver company- focused, premium goods and services Data is one of a company's most valuable assets Any organization should prioritize data protection

Targeted information is commonly used to steal from the firm, sell to third parties, or use unlawfully The extremely sophisticated stolen PII data, like as social security numbers and driver's licenses, caused some of the most catastrophic damage Every firm has significant data that must be protected from external attacks Organizations all around the world are investing heavily in ICT to improve cybersecurity effectiveness.

DESING AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION

Define a security policy

A privacy policy is a type of current document that contains instructions and legal information that specifies how to halt and deal with dangers inside a company, particularly those caused by computer security concerns situations as they emerge The company's digital assets, as well as any dangers to those assets, must be listed in the privacy policy All employees must be aware of the company's privacy policy Policy must also be revised on a regular basis

Although targeted attacks are kept to a minimum since they might have unintended consequences if used incorrectly, security solutions are never meant to prevent Although installing security is simple, it is also quite effective Such restrictions will also limit user access and security measures, mitigating any unwanted consequences (What is Security Policy? - Techopedia definition, 2022)

Figure 7 Security Policy There are five sorts of privacy policies, which I shall illustrate with examples:

1 Data breach response policy: Its objective is to define how the investigation and repair procedure will affect businesses and customers

2 Acceptable use policy (AUP): An AUP is a standard new hire referral policy that describes the rules and processes that employees must follow in order to access a company's network or systems

3 A disaster recovery plan was created as part of a larger business continuity strategy that incorporated proposals from the IT and cybersecurity teams Following that, the matter will be handled by teams that have been designated in accordance with the data breach response policy

4 In the event of a major incident or a loss of power, communications, or other critical resources, the business continuity plan will detail how the company will function in an emergency and will coordinate operations across the whole organization

5 Access control policy: Techniques for tracking system usage and access are regularly implemented as additional functionality There is no undesirable system software control, network access constraints, or user access requirements.

The elements of information privacy policy

The fundamental goal of that policy is to provide us with an overview of information security while also detecting and preventing attacks From there, it is feasible to preserve and protect the organization's brand while also upholding law and completely respecting the interests of consumers

Determine whether regions are covered by the "Wheelie good" information privacy policy In addition, we may define which things are excluded from the restriction

Data should be classified using existing categories, according to policies The aim of data categorization is to guarantee that sensitive data cannot be accessed by anyone, ensuring complete data security To sort data by security level, "Wheelie good" must categorize data into discrete portions such as "public," "secret," and

"top secret." To arrange data, data classification should employ a hierarchy:

• To sort data by security level, "Wheelie good" must categorize data into discrete portions such as "public,"

"secret," and "top secret." A hierarchy should be used to arrange data classification:

• Level 1: Information available to their firm, data with no protections, publicly accessible

• Level 2: The data is secure; the data will not create any harm within the system Data leaking will obviously have no effect on "Wheelie good," as this level of information has a low security priority

• Level 3: If data is made public, it may cause harm to the organization Information that might be harmful to the firm or its consumers

• Level 4: The organization will suffer greatly if this level of data is revealed If the information becomes public, it may have an impact on your company or consumers

• Level 5: Leaked data will affect the firm and, in particular, its personnel If information is made public, it will almost definitely do substantial harm to your organization and its consumers

2.4 Authority and access control policy:

The privacy policy must specify who in "Wheelie good" has the power to deny data access These employees must be trustworthy and skilled enough about data security to determine which information should and should not be exposed This section should describe how much influence each job in your firm has over information and IT systems It should also define the security criteria that the corporation must follow, the access controls in place and in charge of the business, and the security methods used to secure sensitive data There are a number of common access control techniques

• Require a strong password that is correctly established

• Three-factor authentication is required for the account

2.5 Policies for access control and permissions:

Senior managers may have the authority to decide who has access to data and with whom Senior executives may be subject to different privacy policies than lesser staff The policy should specify how much control each organizational task has over IT systems and data

Users must use a specific login that involves authentication, such as a password, biometrics, ID card, or token, to access corporate networks and servers Every system should be monitored, and each login attempt should be recorded

One of the most significant steps in increasing firm security is the dissemination of the IT security plan Workers at "Wheelie good" are unlikely to encounter scenarios in which reading and signing a paper proves that they are aware of and agree with the new requirements The training sessions will leave support employees with a better awareness of information security and a more favorable attitude toward it They will also have a better awareness of the data security and sensitivity rules and practices that are in place (Warner,2002)

Give the most and that should exist creating a policy

Not all policies developed are beneficial and consistent The policy-making process may be inherently unfair and generic They usually cause more problems than they are supposed to solve Policies are created in response to the concerns of others The current policies of the organization are mentioned below

Before we write a new policy, we should see whether there are any existing policies with similar information If this is the case, we will make the necessary changes rather than enacting a totally new policy

Policies should be introduced when there is a clear need and a problem that must be handled Different approval levels must obviously assess policies to see whether they are acceptable for the corporate context

Each definition supplied in the policy's phrase aids the reader's comprehension By adopting straightforward, non-abstract grammars, the policy can significantly enhance other people's reading and understanding Underlines should not be used in subheadings, and important policy wording should be bolded To prevent having to alter the policy anytime an employee changes, the email used must also be updated with contact information For example: "Contact the deputy finance manager to "; "The CIO office is accountable for "

Accountability is another critical component of policy assurance Most policies adequately explain their rights and capability requirements, and queries about the policy are made, necessitating clarification from an informant

Employees can access suitable policies using version-storage applications such as SharePoint Employees must have clear access to the policies and create multiple versions, allowing everyone to evaluate the policies in different versions

3.6 Procedures for dealing with exceptions :

There are always exceptions to the rule in life There are exceptions to the norm in this situation as well, although they are frequently many Finding anomalies that may or may not be covered by the policy is much easier When "Wheel Good" throws an exception, it is quite useful since it allows for better situational control Because laws are placed in place to manage behavior and create a level playing field, it is critical that exceptions are granted fairly and equitably If the exception procedure is utilized recklessly, a whole policy might be implemented.

The step to design a policy

The first step in creating an effective privacy policy is identifying the key and critical content that must be protected by the policy because of the potential harm that external attacks on content resources may cause

The simplest practical solution is to use the policy to aid in the preservation of as much "Wheelie good" as feasible According to the "Wheelie good" definition, components, hardware, software, and applications are all assets

4.2 Analysis of security risks for each asset:

Physical and immaterial assets are both important for different reasons In general, "Wheelie good" losses may be directly related to risky investments A corporation's risk management plans and processes must take the concerns into account When dangers are well identified, applying and preventing them becomes easier A risk level matrix should also be utilized to help design a proper set of regulations for the firm because each risk will affect it differently

After the dangers have been adequately determined, the security criteria will substantially aid the system's proven security functions The organization's activities are maintained safe due to the frequent correctness of security standards A policy must be developed in compliance with the security needs criteria

Create a security plan that conforms with "Wheelie good specifications." A security strategy is a formal document that defines the security requirements for an information system and identifies the security methods used or suggested to be used to meet those criteria A security plan should specify the amount of time, personnel, and other resources required to establish and implement a security strategy

After adopting the security rules and content, the "Wheelie good" organization must carry out the policy implementation process by training workers on the policies, which may occasionally be breached exclude one or both When the policy is implemented, workers are able to appropriately express the policy's actual consequences on "Wheelie good" in addition to fully comprehending it End users frequently provide questions or examples about the training topic, which may be highly beneficial These inquiries can help to improve the usefulness and definition of the policy

All workers will be expected to read, sign, and understand the policies listed in order to guarantee that all policies are properly understood by all employees and to avoid internal arguments

4.7 Establish and enforce the regulations:

The "Wheelie good" policy is developed and implemented for its own sake, not as a set of optional restrictions Establish detailed instructions outlining the consequences of violating privacy standards After that, put them into action A badly implemented privacy policy is nearly as bad as having none.

Implementation of the policy

We have a solid suggestion for the export bicycle parts manufacturer "Wheelie good" in terms of developing a privacy policy for their company based on the client's requirements, which is as follows: We will employ the IT Security Policy and the Incident Response Policy to address this issue

The majority of businesses will face a system attack, which might have catastrophic consequences if SIRP is not implemented and backed by an information security strategy That's why I went with the Indented

Response Policy An incident response strategy will mitigate the effect of a breach, minimizing unnecessary fines Data breaches will be rapidly remedied if they are used

The first phase of an incident response plan is preparation, and it is the one with the most extensive preparation This phase will involve the following steps:

• Employees in "Wheelie good" must have extensive training on their specific roles and duties in incident response as well as information security awareness

• Rehearse events on a regular basis and create gaps in incident management created by human and policy flaws for speedy evaluation

• Put money aside in case something goes wrong

• Regulation and protection are required in the security and data-related areas

• System access identification is necessary

• Employees accessing the remote system must use restricted partitioning mode

• Other "Wheelie good" headquarters must have a secure Wi-Fi network that meets WPA3 Wi-Fi requirements

• Each department must utilize dedicated VLANs

• When creating passwords, utilize the highest level of security possible, including special characters

• Accounts such as User Account, Shared Account, Service Account, and Privilege Account must be decentralized in the system

Identification is the procedure of determining if "Wheelie good" has been hacked or whether the software is still operational

• Internal intrusion detection: If an intrusion is detected, it will give a warning and boost the security level

• While investigating the sale of patient health information, law enforcement detected a breach

• "Wheelie Good" must be fitted with authentication such as ReCAPTCHA, authentication by fingerprint, face,

When an organization gets attacked, the first thing they want to do is solve the situation However, we will not do it instantly in "Wheelie Good," but we will create infringement check mechanisms to establish how and when it is violated This manner, we can avoid future attacks

• When a data breach is discovered, do not immediately patch the system

• Do not remove and reinstall the system

• Incident response strategies should be put in place as soon as you become aware of a potential data breach

We will adjust the rules and practices that lead to the violation after we have determined how to manage the matter

Malicious malware or apps that infiltrate the system will be uninstalled and separated The system will automatically release updates to fix the bug once more

• "Wheelie good" must have a vulnerability detection system installed

• Incidents in "Wheelie good" will be reported alongside the system in the risk group the organization is using, such as Slack or Teams • In the case of an emergency, a prepared incident response team (CSIRT) will be on hand to help

• When exceptions are discovered, they will be investigated, and suitable control measures will be adopted

Recovery following a data breach allows the afflicted system and device to resume regular operations We will test all validated systems before putting previously impacted systems into your production environment after the source of the intrusion has been located and eradicated

• Backup and encrypted files are ready to guard against threats

• Review the System Security Software Incident Response on a regular basis and attempt to maintain it as simple and comprehensive as feasible.

LIST THE MAIN COMPONENTS OF AN ORGANIZATIONAL DISASTER RECOVERY PLAN,

What is the definition of business continuity?

Business continuity refers to an organization's proactive planning and preparation to ensure that vital business operations can continue in the event of an emergency, such as a natural disaster, pandemic, workplace violence, or any other situation that disrupts normal business operations Planning and planning for incidents that might disrupt or harm services is equally as important as incidents that would completely shut down operations

Components of recovery plan

An organization may face a variety of crises, and many different parts of it must be safeguarded The first and most basic element of a disaster recovery plan is to determine its scope

In order for recovery to succeed, we must have a clearly defined disaster recovery team, be familiar with well-documented recovery processes, and carry out a specific task according to the plan In the event of a tragedy, "Wheel Goods" will require a disaster recovery team with a thorough grasp of recovery methodologies The recovery team's responsibilities extend beyond what must be done during and after a disaster Ensure that a large number of individuals are familiar with how to accomplish the essential task so that, if something goes wrong, it is not done wrongly or inaccurately

2.3 Business functions and tolerance for downtime:

It's probable that we didn't fulfill the critical business functions of "Wheel Goods" properly or at all to determine the tactics that will assist the firm recover from a disaster The first technique requires us to first identify these functions before assessing how long we can function without them before suffering a significant loss RTO (Recovery Time Objective) is another term for this You can more effectively prioritize the procedures indicated in your recovery strategy by defining the CBF till they are restored

Strategies for ensuring that your main company processes run smoothly The strategy of "Wheel Good" may be built around the business functions that must be restored in order for the organization to function We should describe the following for each key business function: the recovery activities necessary to backup or restore, as well as the resources required to support those operations A checklist for assessing catastrophe damage and tracking recovery should also be developed

Effective communication is required to show that a situation is completely under control If a catastrophe occurs, we must cooperate with other parties to find a solution To successfully communicate, it is critical to comprehend the essential communication chain, send information as rapidly as feasible, and appropriately document events This is why having a comprehensive media plan that addresses each of these areas is critical Depending on the circumstances, this plan should include a contact list of the people who need to be reached as well as information delivery techniques and strategies

2.6 Schedule tests, reviews, and improvements:

It is not as simple as creating a DRP and preparing your firm for anything The organization consults "Wheel Goods" software to test or practice the strategy, confirm that it is advantageous, and test it to guarantee that it corresponds to industrial and commercial standards on a continuous basis Despite the fact that some of the actions you must consider as part of a disaster recovery plan may appear simple, it is common for people to make poor decisions when there is no immediate danger Instead, shock, horror, and panic reign supreme

These strategies detail the activities your company must take in various conditions to mitigate the impact and assist you achieve better results in all situations.

Required steps in disaster recovery process

3.1 The key activities of “Wheelie Good” project:

We'll start by identifying the duties that are required for "Wheelie Good" to work The type of products and services offered by the company, as well as its reliance on its current location, may have an influence on this By better understanding the security vulnerabilities that already exist, we can address the modifications that must be made to your organization's cybersecurity strategy, whether they are industry-specific or particular to your business Meetings with department leaders can help you decide whether hazards will impede operations in their area as part of this approach To guarantee responsibility, assign someone on your team to oversee the planning process

The next phase is to evaluate potential disaster scenarios, especially how they affect the "Wheels Good" company, such as a security crisis or a natural disaster In the event of a natural disaster, we must shift corporate resources, for example, to a secure location This is not the case when disaster recovery strategies are appropriate in all scenarios The next stage is to collaborate with all of the firm's departmental leaders to identify each crisis scenario and the appropriate course of action for it In this manner, you will be able to clarify your goals and the status of your rehabilitation following a disaster

We must have a communication plan in place regardless of the type of crisis to ensure that "Wheel Good" operations and security are maintained move Managerial positions must be precisely defined In the event of a fire, for example, the maintenance supervisor is expected to notify the CEO before sending along a sequence of contacts to the workers If you must relocate or close your company, have a strategy in place to q y y p y gy p notify clients of the situation and how to contact you Appoint someone to handle social media interactions and monitor social media for customer inquiries if the phone system fails In the case of a data breach, your communication strategy should include regulatory and public relations remarks to reassure investors and the broader public

3.4 Plan for data backup and restoration:

Employee duties may be defined in the data backup strategy, and they play a crucial part in keeping the business safe, which is fundamental intrusion prevention We can delegate and allocate duties based on department or seniority level, but everyone should contribute to the company's recovery A disaster recovery plan should be broad enough to operate in all conditions while still being tailored to your individual needs

Determining what information is critical to the running of the firm must be examined Your offsite backups should include everything you need to keep functioning if a network restoration fails, from client data to security processes, account details to project notes The plan should contain a checklist of all necessary equipment and data, as well as your 24-hour recovery contact information and alternate meeting places

Information acquired from each catastrophe encountered by the "Wheel Good" firm can be utilized to improve the next natural disaster response or to prevent future violations

Once a properly defined disaster recovery strategy has been effective, we will revisit the "Wheelie Goods" plan We may try a simulation of a natural disaster or a breach If gaps in the plan are discovered, we can reinforce or supplement them to make the program more successful.

Some of the policies and procedures that are required for business continuity

4.1 Create a strategy and define goals:

The first stage in that planning is to identify the business continuity plan's goals and set goals around them

We can establish objectives such as:

• How accurate and practical should the strategy be?

• Which departments will be covered by the plan?

• What milestones should we keep note of?

The cost of the danger of "Wheel goods" should be considered on a regular basis Include any preparation or study hours, training, and materials time, and so on while establishing this strategy Business continuity management encompasses the whole business and goes beyond information technology

A business continuity plan (BCP) is a system for attempting to halt and recover from potential business risks The strategy ensures that resources and personnel are protected in the case of a disaster and that operations can restart as soon as possible They consider it an essential component of a risk management strategy since it requires the identification of all dangers that may influence a company's operations Natural catastrophes and cyberattacks are examples of risks Threats and disruptions result in lost sales and increased expenditures, lowering profits Furthermore, because insurance does not entirely cover expenses, leaving customers looking for alternatives, businesses should not rely only on it It is usually held in front of key stakeholders and workers

Impact analysis is a critical component of the "Wheelie Goods" strategy The BIA examines potential risks for each component of the business Predict may be able to assist your team in developing a unique template After they have tested the BCP for any potential weaknesses, it must be changed Using this knowledge, you may later modify your recuperation method The BIA report should detail the company's basic operations as well as the areas that are critical to its survival Any resources required to keep these critical components operational in the case of a disaster must be explained This will make it easier for you to choose the most practical and cost-effective solution while considering the hazards

We will determine which critical business operations will have the most impact on the whole firm Income loss, reputational impairment, or the firm's inability to operate successfully are all instances of damages Examine each firm feature and function and provide a rating of high, medium, or low

This is the most detailed section of a business continuity plan We begin by evaluating the present recovery of "Wheel Good" and considering how to enhance it Among the procedures are:

Response strategies: Every department must have an emergency response strategy in place In the case of an emergency, include precise instructions for each member of the business continuity team Recovery strategies: Once the dangerous event has been avoided, the primary purpose of "Wheel Good" is recovery This stage of the continuity plan defines the scope of the Recovery Time Objective (RTO) and describes exactly what they are and who is accountable for implementing them This gives stakeholders precise figures for initiating a recovery strategy The Recovery Point

Objective (RPO) specifies the data recovery timescales accessible in the case of loss or damage The recovery point objective (RPO) is a time-based evaluation of the maximum amount of data loss that a company can endure A comparable occurrence or event that occurred previous to data loss that exceeded what an organization considers acceptable In the case of a computer or network failure, RPO establishes the maximum age of the data or files in the data backup necessary to satisfy the RPO target Loss tolerance is connected to the quantity of data that an organization may lose without substantial consequence and is part of the organization's business continuity plan (BCP) Because it refers to the last time an organization's data was stored locally, it also governs disaster recovery planning, including how long backups can take acceptable

4.6 Examine and determine ongoing program maintenance:

Business continuity planning should grow in tandem with the company A quality assurance approach can assure effectiveness if specialized departments keep an eye on it This might involve the scheduling of audits as well as the audits themselves

• Internal evaluation: Businesses should perform an annual plan review This section will explain when it is necessary to upgrade due to: o Environmental risks o Changes in the company's structure or personnel o Employees are spread regionally

• External reviews: Having an independent consultant engage and analyze or recommend modifications to the strategy might be beneficial This section should specify when this occurs and who will do the evaluation Continuous improvement requires objective study of a disaster recovery strategy and its implementation

• Additional assessment and training: Keep your business continuity plan up to date with frequent training and testing to adapt to changes This section can clarify when and how the exercises will be carried out The effectiveness of your company's disaster recovery strategy is just as good as how effectively it is implemented

Available at: https://www.exabeam.com/information-security/information-security-policy/ [Accessed 23 August 2022]

Anon., 2022 Techopedia [Online] Available at: https://www.techopedia.com/definition/4099/securitypolicy#:~:text=A%20security%20policy%20is

%20a,potential%20threats%20to%20those%20ass ets [Accessed 27 August 2022]

Available at: https://www.bmc.com/blogs/critical- -tech-policies/ [Accessed 27 it

Available at: https://debricked.com/blog/what- -security-threat/ [Accessed 21 is

Available at: https://www.imperva.com/learn/data-security/data-protection/

Ngày đăng: 08/05/2024, 14:39