Computer Science  >  Research Paper  >  University of Maryland, University College CYB 670 Project 3: Lockdown Step 7 Business Continuity Pl (All)

University of Maryland, University College CYB 670 Project 3: Lockdown Step 7 Business Continuity Plan Team 1 – United States

Document Content and Description Below

University of Maryland, University College CYB 670 Project 3: Lockdown Step 7 Business Continuity Plan Team 1 – United States CYB 670 Capstone in Cybersecurity Business Continuity Plan for C ... ommunications Systems The goal of a business continuity plan (BCP) is to have the ability to restore full operations of a network of a company though a systematic and predetermined set of processes and procedures with as little impact as possible. The BCP is designed to ensure that communications and the methods of the company are defined clearly and are full defined in case of an attack on the network. Communication planning will be the most intricate part of the BCP process so that information is passed along to employees, damage can be assessed and that information can be passed along, and a recovery strategy can be implemented to get the network back up and running efficiently. Through the use of planning, testing, and exercising the communication procedures that are in place, a company can ensure the continuity and viability of business operations (Technical Response Planning, 2014). The four phases of a BCP will be the notification, verification, stabilization, and recovery stages and each must be completed, updated, and documented to allow quick recovery from an attack. In the notification phase the discovery of the incident has happened and the proper managers have been given the location of the potential impact, the details of what happened in the breach, and the timeline that the incident occurred as well as up to date contact information to allow the dissemination of current information. Also in the notification phase the initial communication procedures and equipment as well as an alternative communication format should be established to allow the company to continue working. The verification phase will consist of the contact information updated on a periodic basis to include the new people of the company via email or telephone. Stabilization will occur once the corrective actions such as initiating proper notification or the established course of action has been implemented. Planners will identify and procure the communication equipment to allow back up processes to allow work to continue during the crisis. And the recovery part of the BCP will begin once the affected area, personnel, company equipment, and the operational flow is all stabilized and running as expected. The communication portion of the recovery phase will consist of damage assessment reporting, interactions of all the personnel involved, and what actions were done to remove the disruptive element and to prevent that from happening again on the network (Technical Response Planning, 2014). Software Development Life Cycle (earlier steps) Operating Procedures The BCP will describe the normal operating procedures, standards, and practices for the operating systems for the company to include the critical systems that are on the network. Included in the standard operating procedures will be system fundamentals, operating system security, patching, and how to implement protections in the Windows 10 environment. Operating System Fundamentals in Windows 10 will control the management of the computer and all applications that are loaded onto the computer systems. The security procedures that will need to be implemented in the operating system will need to include defense against viruses, malware, DDoS, as well as passive and active monitoring of the data that is going across the network and coming from the machines. The main aspects of security for operating systems is the prevention of theft, integrity of data, and availability of resources. For security to ensure that these aspects are being handled, patching of software will need to occur. Patching is a piece of software that is designed to change the code of the operating system or application to make it more secure by fixing certain vulnerably in the software. An operating system is a suite of software with the job of managing the use of processes and resources on a network or computing device. The operating system is unique in that it will function with both the hardware and applications (software) of the system and the job of security is to protect the operating system from unauthorized access and use by attackers. Security breaches occur all of the time and most are caused by the end-user of the device unknowingly to them or others through the clicking of random hyperlinks in email or with deliberate intent. Operating systems can be secured with restricting the access to the operating system directly through the use of role based access control or similar restricted based access. Role based access control limits the ability for the end-user to access and use various resources that are present on the system. The advantages of using a role based access system is that the system is easy to set up and implement on the network with the ability for the company to group various resources and allow users to only have access to the resources that are needed by them. A disadvantage of using the role based access is the administration of implementing this system and will need to have documentation implemented strictly everyone in the company will need to adhere to the system (Carnaghan, 2015). Security Considerations for Wireless Network Wireless network security has a number of basic fundamentals that need to be understood when being deployed for use. Wireless networks will use two basic frequencies when being deployed: 2.4GHz and 5GHz and from a security point of view. Having two frequencies will not affect the risk to the network but will allow the attackers to block a specific frequency to force the device onto a different access point and this can become a security concern. Another wireless concept to understand is how networks identify themselves to devices and that is through the use of a service set identifier (SSID) via the access points through a broadcast. Security that is proven for wireless networks comes in the form of IEEE 802.11i WPA which uses shared keys to communicate between access points and clients before any kind of wireless connection is made to the network (Wilkins, 2011). Attackers are always looking to gain access to wireless networks via security loopholes like rogue access points. [Show More]

Last updated: 3 years ago

Preview 1 out of 10 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of University of Maryland, University College CYB 670 Project 3: Lockdown Step 7 Business Continuity Plan Team 1 – United States document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$9.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

111
0

Document information


Connected school, study & course


About the document


Uploaded On

Nov 15, 2022

Number of pages

10

Written in

All

Seller


Profile illustration for Kirsch
Kirsch

Member since 6 years

949 Documents Sold

Reviews Received
111
37
8
4
28
Additional information

This document has been written for:

Uploaded

Nov 15, 2022

Downloads

 0

Views

 111

Document Keyword Tags

Recommended For You

Get more on Research Paper »

$9.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·