· Title
· Student ID
· Name
· Word Count
Note:
No more than 1 Page
Potential Content
· Background
· Purpose and the Scope
· Your approach
Note:
No more than 1 Page
Potential Content:
· Determine mission/business processes and recovery criticality in the context of Soft Arc Engineering Ltd.;
· Analysis and prioritization of business processes/functions within the organization, based on their relationship to the organization’s mission. A weighted analysis table (weighted factor analysis) can be useful in evaluating business processes/functions.
· Identify Business Process and Recovery Criticality. Use the given basic requirements for contingency planning. Briefly explain each.
o Recovery time objective (RTO)
o Recovery point objective (RPO)
o Maximum tolerable downtime (MTD)
o Work recovery time (WRT)
· Identify additional resource requirements
Resources:
· Weighted Score; Table 6-2, Page 331, Whitman and Mattord (2019)
· NIST SP 800-34, Rev 1
Business Process
|
Assets Involved
|
Resources Required
|
Additional requirements needed to satisfy the recovery
|
Weighted Score
|
Impact
|
Recovery Priority
|
RTO, hrs
|
RPO, hrs
|
WRT, hrs
|
MTD, hrs
|
Description & Estimated Cost
|
Providing support services
|
Servers and data storage
|
-
-
-
|
|
|
|
|
4
|
6
|
|
|
Ref. Slide #22
|
…
|
…
|
…
|
…
|
…
|
…
|
…
|
…
|
…
|
…
|
…
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note:
No more than 2 Pages
Potential Content:
· Introduce the purpose and significance of incident response in the context of Soft Arc Engineering Ltd.;
· IR Planning process.
Example(s):
Detecting Incidents
Incident
|
Possible Indicators
|
Probable Indicators
|
Definite Indicators
|
Potential Indicators
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Incident Handling Procedures
Before the Incident
|
During the Incident
|
After the Incident
|
Immediately report to the system admin and if any message …
|
Do detail scanning of all the network devices …
|
Avoid downloading suspicious content ...
|
|
|
|
|
|
|
|
|
|
|
|
|
Incident Containment Strategies
Incident Category
|
Containment strategies
|
DoS
|
· Disable the incoming network traffic
|
|
|
Resources:
· Slides 32-43
· NIST incident Response Life Cycle
· NIST Cyber Security Framework
Note:
No more than 1 Page
Potential Content:
· Description and the purpose of backups in the context of Soft Arc Engineering Ltd.;
· Make connections with the relevant business process and their priorities identified in the Business Impact Analysis
Example(s):
Backup Description
Resource to be backed up
|
Relevant Business Process
|
Backup Method
|
Backup Regularity
|
Offsite/onsite
|
Accounting Software
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Note:
No more than 1 Page
Potential Content:
· Description and the significance of disaster recovery and re-establishing operations at the location(s) where Soft Arc Engineering Ltd. Operates from;
· Make connections with the backup planning where appropriate.
Example(s):
List of disasters and their categories and description about each (eg: natural, man-made)
Potential Disaster
|
Business Processes (as identified earlier) potentially affected
|
Disaster Recovery Response Team
|
Disaster Recovery action(s)
|
Fire
|
|
|
|
Flood
|
|
|
|
|
|
|
|
|
|
|
|
5 to 10 references – IEEE (numbered reference list)
Maximum 2 web references
Quality academic sources such as conference papers, journal articles, book chapters