1 COMP9721 Assessment 3, S1-2018 COMP9721- Enterprise Information Security Assessment 3 - Completion of Contingency Plan: Implementation, Guideline & Timeline Proposal Semester 1, 2018 Details: Title:...

1 answer below »
hi this enterprise information security. this is third assignment and 2 nd assignment is also done by you. please do your best. you need to do assignment three and i m also sending you rest two assignments which will help you in making this assignment.


1 COMP9721 Assessment 3, S1-2018 COMP9721- Enterprise Information Security Assessment 3 - Completion of Contingency Plan: Implementation, Guideline & Timeline Proposal Semester 1, 2018 Details: Title: Assessment 3 – Completion of Contingency Plan: Implementation, Guideline & Timeline Proposal Due Date: 5.00 PM (GMT+8) Friday, 8th June 2018 Value: 40% of the final mark for the topic Length: Maximum of 6000 words (excluding cover page and references) Note: This Assessment 3 is not the same as for COMP3721 (undergraduate topic) – there are additional research component on compliance to regulation and standards, as noted in the task section below. Purpose of this assignment: The purpose of this assignment is to support the following Learning Outcomes (LO) for this topic: LO1: Understand the purpose and context of a range of typical business information systems. LO2: Understand the importance of securing the information of an organisation. LO3: Recognise the security issues associated with the integration of various information systems within an enterprise. LO4: Understand the principles of computer security. LO5: Analyse security risks and prepare information and computer security plans. LO6: Prepare and present consultant's reports on aspects of computer security. LO7: Critically analyse publications in the area of computer security. The assessments in this topic follow on from one another (formative) across the three assessments. This means that you will to use the preceding assessment to complete the following one. For instance, you will need the outcome from Assessment 1 to be able to complete Assessment 2, and the outcome from Assessment 2 to complete Assessment 3. Case Study: Megacorp, a subsidiary of Generico Inc., have hired you to undertake a full risk assessment of their current security posture as they prepare to move to operating on a multinational scale. 2 COMP9721 Assessment 3, S1-2018 Megacorp currently processes and stores financial and client data in-house, with cloud services for operational usage and productivity. Staff work on Windows desktops, with an ad hoc patching cycle. There is also a backup system for the legacy in-house Windows servers, although the details of how this is configured is unknown as the System Administrator responsible for this process has recently left the company and did not leave any documentation on this. Megacorp use an old storage room as their server room, as the legacy software sometimes requires easy physical access to the servers running them for maintenance. The office is open-plan, and staff are encouraged to get up and move around during the day. The cloud system is used mainly for document collection, although there is not a mandated service specified by the company. Given the quality of your preceding documents, the company has asked that you provide recommendation of timelines, implementation recommendations and ongoing maintenance guidelines, in reference to your analysis. Given the period of current rapid expansion, management wants only a report for the most critical risks identified in the analysis. Task: Based upon your risk assessment and risk register from Assessment 2, you must complete the contingency plans to expand on Assessment 2. A report for the CEO, CIO and CISO, providing an outline of steps required for implementing controls, along with a rough timeline and maintenance aspects. This report should cover: - Deployment and implementation guidelines for specific risk controls - Maintenance guidelines on each presented control - Timelines for each aspect - Summary of your preceding content and documentation In addition, you must research and identify the regulations, legislation and international standards that should/could be used in the contingency planning measures from Assessment 2. Report Requirements: Must Contain Cover/Title Page This must contain the topic code and title, assignment title, your name and student identification, due date. Executive Summary Table of Contents This must accurately reflect the content of your report and must be generated automatically in Microsoft Word with page numbers. Introduction 3 COMP9721 Assessment 3, S1-2018 A brief outline of what the document includes, how it is structured and what you based your decisions in the report on. Main content . You should structure this under appropriate headings. References A list of end-text references formatted according to the Flinders APA Referencing (2017) (PDF 95KB) requirements. It is recommended that Endnote is used to manage references. Your references should comprise of books, journal articles, and conference papers. Format This report should be no more than 6,000 words (excluding references and diagrams) and labelled as .docx and should be in a single file. Your assignments must be word-processed and the diagrams be developed using graphics software (most word-processors provide this facility). The text must be no smaller than 12pt and font Times New Roman Marking Rubric: 40% Total = 40 marks Assessment criteria Maximum marks for this element Student mark Previous Content All Critical Risks identified are present 2 Appropriate Diagrams/Tables 2 Summarised correctly 2 Maintenance Guidelines Relevant to each asset 2 Timeline is appropriate for the asset 2 Included relevant responsibilities / roles / outcomes 4 Links to implementation guidelines 4 Implementations Detailed Outcomes 1 Justifications are adequate & realistic 2 Appropriate to the asset 1 In-line with the risk-analysis and Business Impact Analysis 2 Timeline for implementations are realistic and achievable 2 Applicable solutions proposed 2 http://www.flinders.edu.au/slc_files/Documents/Blue%20Guides/APA%20Referencing%20%282017%29.pdf http://www.flinders.edu.au/slc_files/Documents/Blue%20Guides/APA%20Referencing%20%282017%29.pdf 4 COMP9721 Assessment 3, S1-2018 Regulations/Legislation Regulation identified are applicable 1 Justification of regulations 4 Standards Standards identified are applicable 1 Justification of standards 4 Report Layout & Readability 0.5 Language Usage 0.5 Content Covered 0.5 Referencing 0.5 Total mark 40 (Maximum) Late submission: As stated in the official Statement of Assessments Methods (S1-2018) for this topic, an assessment submitted after the fixed or extended time for submission shall incur a penalty to be calculated as 5% of the total mark for the assessment for each day, (or part thereof) up to 5 business days (Monday-Friday) it is late. After 5 days the assessment will be awarded a zero (0) mark. Academic Misconduct (Including Plagiarism): Flinders University regards academic misconduct of any form as unacceptable. Academic misconduct, which includes but is not limited to, plagiarism; unauthorised collaboration; cheating in examinations; theft of other students’ work; collusion; inadequate and incorrect referencing; will be dealt with in accordance with the Flinders Policy on Academic Integrity Policy. http://www.flinders.edu.au/academicintegrity/ http://www.flinders.edu.au/academicintegrity/student.cfm Turnitin: Turnitin is expected to be used for all assignments across the University. More information and links to Turnitin can be found on FLO. It is recommended that you submit a draft of your work via the Turnitin draft mechanism, to check it for errors in advance. Leave sufficient time for this process, which can be up to 24 hours. Extensions: If you require an extension for submission, you may request one, on an individual basis through the automated extension request tool located on FLO. This is in the ‘General’ section on the FLO topic page. http://www.flinders.edu.au/academicintegrity/ http://www.flinders.edu.au/academicintegrity/student.cfm 1 COMP9721 Assessment 1, S1-2018 COMP9721- Enterprise Information Security Assessment 1 – Case Study Analysis and Risk Register Semester 1, 2018 Details: Title: Assessment 1- Case Study Analysis and Risk Register Due Date: 5.00 PM (GMT+8) Friday, 30th March 2018 Value: 30% of the final mark for the topic Length: Maximum of 2000 words (excluding cover page) Purpose of this assignment: The purpose of this assignment is to support the following Learning Outcomes (LO) for this topic: LO1: Understand the purpose and context of a range of typical business information systems LO2: Understand the importance of securing the information of an organisation LO3: Recognise the security issues associated with the integration of various information systems within an enterprise LO4: Understand the principles of computer security LO5: Analyse security risks and prepare information and computer security plans LO6: Prepare and present consultant's reports on aspects of computer security The assessments in this topic follow on from one another (formative) across the three assessments. This means that you will to use the preceding assessment to complete the following one. For instance, you will need the outcome from Assessment 1 to be able to complete Assessment 2, and the outcome from Assessment 2 to complete Assessment 3. Case Study: Before the design of new security solutions can begin, the security analyst must first understand the current state of the organization and its relationship to security. Megacorp, a subsidiary of Generico Inc., have hired you to undertake a full risk assessment of their current security posture as they prepare to move to operating on a multinational scale. Megacorp currently processes and stores financial and client data in-house, with cloud services for operational usage and productivity. Staff work on Windows desktops, with an ad hoc patching cycle. There is also a backup system for the legacy in-house Windows servers, although the details of how this is configured is 2 COMP9721 Assessment 1, S1-2018 unknown as the System Administrator responsible for this process has recently left the company and did not leave any documentation on this. Megacorp use an old storage room as their server room, as the legacy software sometimes requires easy physical access to the servers running them for maintenance. The office is open-plan, and staff are encouraged to get up and move around during the day. The cloud system is used mainly for document collection, although there is not a mandated service specified by the company. Task: This assessment is designed to demonstrate your knowledge and analysis of a specific security context Using the case study provided, create a risk register for the threat environment for Megacorp as they move towards an international operation. This
Answered Same DayMay 09, 2020COMP9721Flinders University

Answer To: 1 COMP9721 Assessment 3, S1-2018 COMP9721- Enterprise Information Security Assessment 3 - Completion...

Amit answered on May 24 2020
157 Votes
Executive summary
A guide of contingency planning provides an exhaustive list of recommendation, operations and considerations for Information Technology (IT) contingency planning. Contingency planning is defined as the plan of action to recover IT operations after a system disruption or emergency. Plan of action or interim measures may include moving IT system and services to another location, restoring IT functions by using other tools and equipment or restoring IT functions by using manual methods.
IT systems can be affected by various interruptions. They vary from mild such as short time power-break, disk failure, etc. to severe such as destruction of equipment, fire outbreak in equipment, etc. also they may occur from sources like natural disasters, terrorist attacks. Though there are many disruptions which can be avoided, minimized or eliminated with the help of different technical solutions or operations managements. They are cover under the risk management step of the organization. However, it is nearly not feasible to eliminate all risks. Sometimes, the critical resource IT system functioning is present out of the control of organization - electric power, etc. and hence organization will not be able to ensure their 24x7 availability. It can be inferred that contingency planning, execution and end user testing are important for risk mitigat
ion and service availability.
Table of Contents
Executive summary    1
Introduction    4
Adherence to International Standards    5
Overview of BCP phases    6
Roles and Responsibilities    7
Summary of Preceding Plan    8
Business Contingency Planning for Server Systems in Megacorp    10
Business Contingency Planning for Networking Systems in Megacorp    14
Business Contingency Planning for Information System in Megacorp    18
Maintenance    22
Testing, Exercise and Training    23
Summary of Terms and Definitions used in the Document    25
References    26
Introduction
This document presents the contingency plan for Megacorp. It will act as a central repository for all required information, procedures, processes and tasks that are essential to provide a restoring facility to the Megacorp. It will also facilitate the decision-making capacity of the management and it shall provide timely response to any interrupted or extended interruptive in the normal business operations. This is very important in case when the cause of disruption is such which requires immediate restoration of services and cannot be implemented by using normal daily processes. The personnel and financial resources indicated in the document represents the commitment of the management towards the response, resumption and restoration services. Hence, it becomes necessary that information and plans should be maintained in a state that they remain viable and maintain a state to ensure the accuracy of contents of the document.

Scope
This document covers all information related to information systems used, managed or operated by the organization or contractor or agency or any other organization on behalf of agency. The mentioned procedures are applicable to all users, contractors and employees of the organization.
Objectives
There are various types of systems being used in the organization which can be classified as information systems, servers and networking systems. Information systems provide critical functionality to the organization such as email, internet access and whereas the Servers and Networking systems provides the fundamental structure to support the aforementioned information system. They allow customer and organization to perform their respective task. As mentioned above, some of the risks can be mitigated but not all of them. Hence, it is essential for the organization to develop contingency plan and also disaster recovery plans. They will ensure that organization will have uninterrupted operations and regular services to the customers.
The key motive of the contingency planning is to protect two types of assets of the organization: data and personnel. All sections of contingency plan should provide ways to protect and safeguard the personnel and procedures to restore data in case of disaster. The primary focus of the plan is creating policies and processes to protect information system in case a contingency occurs and ensures that assets keep functioning. This covers the operational capability to identify and analyze (Sonfield, 1984) the critical applications, data recovery from alternate backup locations and data restore to pre-disaster state. Along with the above-mentioned objectives, other objectives of plan are as follows:
· Identification of resources to be used during contingency to execute the plan.
· Minimizing the number of decisions to be taken during contingency.
· Identification of actions to be executed by pre-allocated teams.
· Identification of critical data associated with customers that needs to be recovered at the time of contingency.
· Establishing testing and maintenance processes to be used for this plan and also training procedure for contingency teams.
Critical success factors
Following are critical factors and issues which should be applied to the contingency plan of the organization for its successful implementation:
· Commitment of budget for disaster recovery.
· 100% availability of senior management for disaster recovery and contingency planning.
· Establishing and execution of required Memorandums of Agreements, Service Level Agreements and Memorandums of Understanding (MOUs).
· Changes in the current scheduling procedures for transportation of backup data files to the offshore or alternate storage facility.
Adherence to International Standards
For the Business Contingency Plan to be effective, it needs to adhere to international standards. The BCP adheres to the following standards:
· Federal Information Security Management Act of 2002
· National Institute of Standards and Technology or commonly known as NIST under the Special Publication 800-34 R v1, Contingency Planning Guide for Information Technology Systems published in the year May 2010.
· NIST SP 800-53, R v4, Security and Privacy controls for Information Technology and Systems and Organizations published in the year April 2013
· NIST SP 800-84, Guide to Test, Exercise and Training Programs for IT Plans and Capabilities published in the year September 2006.
· Australian Standard or AS: 3745-2010 (Standards Australia, 2010b)
Overview of BCP phases
The BCP or Business Contingency Plan has been designed to recover the data of the organization using a 3-phased approach. This approach ensures that all the data recovery actions are executed in a methodical sequence. This will increase the effectiveness of the recovery effort and reduce the system down-time during contingency. Following are three phases of BCP:
· Activation and Notification phase - This phase comes into execution once a disruption occurs which goes beyond the RTO established for the information system. After the activation of BCP, all the users of the system are notified that an outage has occurred and a detailed assessment of outage will be carried out. The presented collected from outage assessment is sent to the owners of the system. This information is used to modify the recovery procedures of the occurred specific outage.
· Recovery phase - This phase provides details of the recovery procedure followed by the recovery of the system. Procedures are written in a way which suits the demands of skilled technician who can then execute this plan to recover the system with immediate effect and without having any prior information of the system. This phase contains the procedures used for communication of status of recovery to the system users and owners.
· Reconstitution phase - This phase includes the definitions of actions used to test and validation of system functionality. It performs two major activities: validation of successful system recovery and deactivation of plan. During the validation phase, the system is tested prior to returning back to pre-disruption state. These validation procedures may conduct regression testing, concurrent processing or/and validation of data. Once the data is completely restored and system is brought back to normal working state, then system is declared as recover and fully functional by system users and owners. Deactivation part includes sending notification to users about the system being operational. Reconstitution phase also includes the documentation of recovery steps, finalization of logs activities, framing lesson learnt during the updating of plans and preparing resources for any recovery event of future.
Roles and Responsibilities
There are various resources and team involved in the execution and recovery of the system. The following teams have been framed and developed during the contingency times which may affect the IT system. The contingency plan establishes various teams which are assigned with the contingency planning of the recovering functions. The team is assigned with the responsibility of system recovery of the affected computer environment and all its associated applications. Team members include staff who are involved in day-to-day operations and maintenance of the system. The team leader leads the team. The following table describes the roles and responsibilities of the members of the team.
    Role
    Responsibility
    Director, Facility Leadership (Departmental Head)
    · All the responsibility of the development, implementation and maintenance of the contingency plan.
· Ensures that Contingency Plan has been developed with the help of managers who are associated with the business processes of the system.
· Provides information regarding the duration of system down to the contingency plan coordinator based on outage assessment.
· Declares the activation of contingency plan.
· Determines whether the intermediate processing should be activated to maintain the current business operations or the operations should be halted till the system is recovered.
· In case of escalation, high management is to be consulted.
· Responsible for testing, maintenance and sending IS contingency plan to delegates and other personnel.
· Approves all changes in the contingency plan.
    Administrator
    · Manage and monitor the activities of recovery team until the system recovery is completed.
· Ensures that all recovery activities have been performed consistently as the service level agreements.
· Provides timely statues to Contingency plan director.
· Creates an After-Action Report once operations are resumed.
· Assists the contingency plan director in testing, implementing and distributing the Contingency plan
    Recovery Team
    · Determines the expected downtime of the system i.e. Duration between failover and alternate site.
· Prioritizes the resource recovery sequence.
· Conducts all activities of system recovery and resumption activities.
· Retrieve backups
· System configuration.
· Ensures that voice and data communication are working, activates the phones and pagers.
· Provides IP numbers and information network routing.
· Includes validation testing teams.            
    Alternate Contingency Planning Coordinator
    · Same responsibilities as that of contingency coordinator.
· Becomes active in absence of contingency planning coordinator.
Summary of Preceding Plan
    System Acronym
    System Name
    Description
    Server and Mainframes
    Web Server
    Hosting of company’s website
    
    SharePoint Server
    Intranet SharePoint website
    
    Database Server
    Hosting of website’s database and internal database
    
    Exchange Server
    Hosting of Microsoft Exchange server for emails
    
    File Server
    File hosting server
    
    General Purpose Server
    General purpose server for IT admin to control other systems, manage deployments and for security
    Networking Infrastructure
    WAN and LAN Components
    LAN and WAN Access for the company
    
    Firewall and IDS
    Software and hardware-based security for protection
    Information System
    Email
    Enterprise emailing service based on MS Exchange
    
    Payroll
    Payroll and employee attendance system
    
    Invoice Management
    Invoice management system for the business
    
    Communication Management
    Provides enterprise chat and VOIP services
    
    Document Management
    Helps manage company’s document
    
    Corporate Intranet Services
    Helps host corporate intranet website using Sharepoint server
Business Contingency Planning for Server Systems in Megacorp
Activation
The activation of CP procedures as well as notification phase defines the actions that takes place once the Server systems disruption is imminent or detected. This detection may be observed by an employee working on the Server or the application hosted by the server, or it may be reported by a group of users, Server administrators or perhaps due to error-detection and fault-prevention system in place. Irrespective of these, as soon as an anomaly is detected on the server, the decision is taken by the leadership teams and then passed on to the recovery team so that the recovery team can conduct measures to recover the system functions.
Activation Criteria and Process
· A type of outage that would indicate that the Servers (Namely File Server, Database Server, Web Server etc.) would be down for more than the RTO i.e., 12-24 hours.
· The director would determine that whether the system would be able to be recovered on the primary site.
· Additionally, the director would determine if the Server’s CP procedures requires consulting with the appropriate department’s leadership. This includes the following:
· The database administrators.
· The web-server...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here