COVER PAGE · Title · Student ID · Name · Word Count TABLE OF CONTENT EXECUTIVE OVERVIEW Note: No more than 1 Page Potential Content · Background · Purpose and the Scope · Your approach BUSINESS...

1 answer below »








COVER PAGE







· Title


· Student ID


· Name


· Word Count













TABLE OF CONTENT
















EXECUTIVE OVERVIEW






Note:
No more than 1 Page



Potential Content


· Background


· Purpose and the Scope


· Your approach












BUSINESS IMPACT ANALYSIS






Note:
No more than 1 Page



Potential Content:


· Determine mission/business processes and recovery criticality in the context of Soft Arc Engineering Ltd.;


· Analysis and prioritization of business processes/functions within the organization, based on their relationship to the organization’s mission. A weighted analysis table (weighted factor analysis) can be useful in evaluating business processes/functions.


· Identify Business Process and Recovery Criticality. Use the given basic requirements for contingency planning. Briefly explain each.


o Recovery time objective (RTO)


o Recovery point objective (RPO)


o Maximum tolerable downtime (MTD)


o Work recovery time (WRT)


· Identify additional resource requirements



Resources:


· Weighted Score; Table 6-2, Page 331, Whitman and Mattord (2019)


· NIST SP 800-34, Rev 1































































Business Process




Assets Involved




Resources Required




Additional requirements needed to satisfy the recovery




Weighted Score




Impact




Recovery Priority




RTO, hrs




RPO, hrs




WRT, hrs




MTD, hrs




Description & Estimated Cost



Providing support services



Servers and data storage



-


-


-












4



6







Ref. Slide #22






























































INCIDENT RESPONSE






Note:
No more than 2 Pages



Potential Content:


· Introduce the purpose and significance of incident response in the context of Soft Arc Engineering Ltd.;


· IR Planning process.



Example(s):



Detecting Incidents



































Incident




Possible Indicators








Probable Indicators





Definite Indicators







Potential Indicators



































































Incident Handling Procedures





































Before the Incident




During the Incident




After the Incident



Immediately report to the system admin and if any message …



Do detail scanning of all the network devices …



Avoid downloading suspicious content ...
















































Incident Containment Strategies



















Incident Category




Containment strategies



DoS



· Disable the incoming network traffic











Resources:


· Slides 32-43


· NIST incident Response Life Cycle


· NIST Cyber Security Framework












































BACKUP PLAN






Note:
No more than 1 Page



Potential Content:


· Description and the purpose of backups in the context of Soft Arc Engineering Ltd.;


· Make connections with the relevant business process and their priorities identified in the Business Impact Analysis



Example(s):




Backup Description










































Resource to be backed up




Relevant Business Process




Backup Method




Backup Regularity




Offsite/onsite



Accounting Software


































































































DISASTER RECOVERY






Note:
No more than 1 Page



Potential Content:


· Description and the significance of disaster recovery and re-establishing operations at the location(s) where Soft Arc Engineering Ltd. Operates from;


· Make connections with the backup planning where appropriate.



Example(s):


List of disasters and their categories and description about each (eg: natural, man-made)





































Potential Disaster




Business Processes (as identified earlier) potentially affected




Disaster Recovery Response Team




Disaster Recovery action(s)



Fire









Flood













































REFERENCES






5 to 10 references – IEEE (numbered reference list)


Maximum 2 web references


Quality academic sources such as conference papers, journal articles, book chapters

Answered Same DayOct 07, 2021

Answer To: COVER PAGE · Title · Student ID · Name · Word Count TABLE OF CONTENT EXECUTIVE OVERVIEW Note: No...

Amit answered on Oct 10 2021
148 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Word count:
Date: 10/10/2020
Table of Contents
1.    Executive overview    3
2.    Business impact analysis for Soft Arc Engineering Ltd.    3
3.    Incident response at Soft Arc Engineering Ltd.    4
4.    Backup plan for Soft Arc Engineering Ltd.    5
5.    Disaster recovery for Soft Arc Enginee
ring Ltd.    5
6.    References:    7
1. Executive overview
Maintaining the data center for the multinational company like this SEL (SoftArc Engineering Ltd) requires effective analysis of possible risks and their impacts on the business process. The data center of this SEL company is providing wired connections and remote connections to employees laptop. The identical data center is being used by the Australia based employees and overseas employees with authentication. Handling the government projects requires high security to the stored database as the chances of occurring cyber attacks are very high with remote connections. The possible occurrence of any cyber attack can lead to huge losses to this SEL company. These losses can be related to financial losses or reputation losses. Maintaining the secured data center for this SEL company requires business analysis, incident identification and response plan, backup plan and disaster recovery plan. Thus, all these plans are developed for this SEL company. These developed plans will help this SEL company to maintain global operations in Australia and overseas countries. The collective management of all different projects which are developed and operated in different countries can be possible with these developed plans. The handling of any occurred incident or cyber attack can easily be possible by developing these plans for SEL company. The required assets, there recovery procedures, incident identification, incident handling in all three phases, backup plan for all used applications, and disaster handling will be possible with this proposed document. The SEL Company will take advantage of secured implementation of their data center and maintaining global operations. The continuous services for all used applications which are operated from the data center of this SEL company can be possible with this risk identification and mitigation plan. The improved security based work environment can be created for SEL company and the operational execution will also be improved through this proposed incident handling plan.
2. Business impact analysis for Soft Arc Engineering Ltd.
The SEL company is mainly providing civil engineering services in Australia and other countries through their data center. Thus, the business processes, involved assets, cost estimation and priorities of identified assets to recover must be calculated. The table showing all important business processes of SEL company and their assets based on required calculations of time is supplied underneath:
    Business Process
    Assets Involved
    Resources Required
    Additional requirements needed to satisfy the recovery
    Weighted Score
    Impact
    Recovery Priority
    RTO, hrs
    RPO, hrs
    WRT, hrs
    MTD, hrs
    Description & Estimated Cost
    Support services for civil engineers
    Servers from data center.
    - Support application
-Data center
- Support staff.
    Backup of support services database
    10
    High
    1
    4
    6
    2
    0.30
    All the support services for civil engineers will be managed with it. It will cost $2000 to this SEL company.
    Data center management and data storage services.
    Data center server.
    - Support application
-Data center
- Support staff.
    Remote access to the data center.
    8
    High
    2
    4
    6
    2
    .45
    The management of stored data in the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here