Assessment Description: A company profile helps to convey a business’ value proposition to customers and identifies the services and products the company offers. A company profile is a window into the

Place your order today and enjoy professional academic writing services—From simple class assignments to dissertations. Give us a chance to impress you.


Order a Similar Paper Order a Different Paper

Assessment Description:

A company profile helps to convey a business’ value proposition to customers and identifies the services and products the company offers. A company profile is a window into the business, showcasing offerings and providing an overview for business partners, customers, and employees.

Note: This assignment is where you will begin to build your comprehensive Business Continuity Plan (BCP). Refer to the “Programmatic Business Continuity Plan” located in the Student Success Center for more information.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Refer to the “Benchmark – Business Continuity Plan (BCP) – Phase 1” assignment in CYB-515 and, in 750–1,000 words, develop a business profile that defines the business environment. Include the following:

Business Name:

Vision Mission Statement and Goals

  • Mission Statement
  • Vision Statement
  • Goals and Objectives
  • Industry Information/Experience
  • Major Stakeholders
  • Business Organizational Chart (Diagram)

Products and Services

  • Main Products/Service Offerings
  • Consumer Base

Technology and Security Solutions

Refer to your assignment from CYB-515, “System Patching Policy,” and explain what type of technology and security solutions your organization currently has to protect its assets based on the goals and objectives of your security program.

Business Continuity Plan (BCP) and Disaster Recovery (DR)

Refer to your “Business Continuity Plan – Phase 3” assignment from CYB-535 and briefly describe the type of plans your organization currently has in place for the BCP and the DR. Address the following:

  • Describe cybersecurity incident preparation, system, and data identification by creating a Cybersecurity Incident Response team and program.
  • Continue to develop your disaster recovery program for your business.

Note: Since this course is the culmination of the Business Continuity Plan, students may utilize or adapt any of their previous assignments from earlier classes in the program for assignments in this course.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Assessment Description: A company profile helps to convey a business’ value proposition to customers and identifies the services and products the company offers. A company profile is a window into the
13 Business Continuity Plan Executive Overview With the development and new trends in the market, financial institutions are likely to face risks resulting from cyber-attacks, software failure, terrorist attacks, hardware failure, computer failure, and natural disasters, among other problems. It is essential to develop a business continuity plan that can be relevant in addressing possible risks and how the business can recover in case of a cyber-attack. In case of risks such as a terrorist attack or disaster within the financial institution’s location, the institution is likely to suffer direct impacts. This is because the organization will suffer direct and indirect expenses such as renovating the damaged property, and the institution might suffer losses in revenue due to reputation, depending on the type of attack. This report aims to develop an effective business continuity plan that might minimize risks to a financial institution despite a disaster. (Kumar, 2020) Document change control For changes to be implemented in an organization, they have to be discussed using a predetermined procedure that captures the primary considerations of the change. Some of the activities that might occur in an organization and lead to change include upgrading systems in the infrastructure and increasing employee wages, among other activities. When changes are to be made in the organization, it is always essential to discuss the proposed changes before implementation to ensure that all the team members are aware of them. Furthermore, discussion of the changes helps ensure the institution’s operations are not disrupted, which might waste the time and resources of the organization. The chart below illustrates documentation of a change and steps that were taken to implement the change. Project: upgrading information systems Client: Mervin INC. Project manager: Jeffery Patel Change ID Date Change Description Authorization Changes and Effects Permission Date Time Cost EQ 31894 17/07/2021 Installing new information technology devices that will enhance security Yes 25/07/2021 One month $87,000 Well-executed change control has several benefits to an organization. One of the main benefits is that it allows the workers to control themselves psychologically, thus allowing them to meet the plan’s demands. The second benefit of a well-executed plan is that it allows the resources to be equally distributed, which is crucial in the operations of the financial institution, thus making the operations of the business keep running smoothly. (Stein, 2018) With an effective change plan, it is possible to enhance the teamwork process. This is because for an effective change to occur, all the team members must collaborate, which will likely lead to enhanced efficiency as all activities will be carried out in the specified amount of time stated by the change to be made. If the team members can adapt to a change on time, the company’s productivity is likely to increase, thus allowing the company to meet its demands. Below is an outline for an effective change process. Change Proposal – Change identification is the first step toward making the change, and it should mainly come from a member inside the institution. After a person identifies the area to make changes, relevant communication channels should be used to allow the message to reach the required stakeholders. Change benefits can be documented at this stage. Impact summary – In this stage, the project manager analyzes the larger context of the change’s impact. Some variables analyzed include resources to be deployed, employees, additional costs, and the risks that might be encountered. After the manager has analyzed the change, he can accept or decline the change that has been proposed. Decision making – After the manager has fully assessed and approved the change, the manager has to discuss the change with the board of directors, depending on the organization. The board of management can schedule to discuss the change for them to make more evaluation on the impacts of the change. Implementing the change – if the change has been accepted, it moves directly to the planning stage, where effective action can be developed. Implementation might include the start date to the end date to monitor the results of the change. If there are inconsistencies associated with the change, the management team can move to the previous regression. On the other hand, if the change is successful, it can be documented in the organization’s operations. Closure – This is the final phase of the implementation as it involves wrapping up operations associated with the change. Presentations of the outcome may be documented at this stage and the people involved in implementing change. If all the organization members agree with the change, the change documentation can be signed to be used for the company’s future. Introduction Overview Mervin INC. is a financial institution that mainly provides loans to customers who are required to pay back at a particular interest for a particular time. Apart from offering loans, the company offers investors an investment opportunity and banking services where they can invest. According to the company’s policies, the minimum investment amount is $1000, and interest will emerge after six months at least 18 years of age. The policies have attracted more users, thus allowing the company to expand to other geographical locations. Scope of plan Despite the company developing effective strategies to prevent cyber threats and disasters, the business needs to develop an effective business continuity plan. Without an effective continuity plan, the company can undergo risks that might be hard to recover from, leading to the organization’s failure. After a detailed assessment of risks that might impact the business, the company developed a detailed risk assessment which covered disruption of power supply to the company, equipment failure, application failure, human error and sabotage, cyber-attacks, natural disasters like earthquakes, and also malware attacks to the systems. (Mbiru et al.., 2020) Applicability Since the company has been developed recently, it has not covered most parts of the nation; thus, it has allowed customers to register via its online platforms, where they can get services they might need depending on their credit records. Despite customers from various geographical locations accessing the organization’s services through its platform, the cyber security teams of the company have put into place various measures to ensure that the company and its customers are protected to prevent cyber-attacks. Firewall – This feature has been installed in the company’s information systems and will be used to filter the ongoing and outgoing traffic based on the users’ predefined policies. This feature will monitor the users’ activities and warn them about their sensitive information to enhance security from and to the network. Access control – this feature will be used to define privileges for the users who use the computers depending on their roles in the organization. Company employees will have different rights compared to the customers, thus allowing them to carry out their tasks efficiently. This feature will ensure that the employees are not provided with unnecessary rights that might compromise the organization’s security. Encryption – This feature has been implemented as end-to-end encryption, ensuring that data is not leaked to unauthorized parties who might try getting it using man-in-the-middle attacks. With encryption, the company’s security will be prioritized, thus ensuring the safety of the company and its employees. Physical security measures – The Company has installed a perimeter wall with an electric fence to keep unauthorized parties from getting to the organization. Furthermore, guards at the company’s main entrances are equipped with metal detectors to ensure no one enters the premises using an assault instrument, and the storage devices will be effectively evaluated upon getting to the premises. Cloud storage – The Company has opted to cloud storage to ensure that the required information is provided to whoever needs it at any particular time, depending on the user’s rights. This helps the company’s customers access the organization at any given time and access the services they would like, leaving them with a smooth experience. The company also uses cloud storage to create backups if an organization’s cyber-attack occurs. Risk Assessment Matrix Risk The risk likely to be experienced in the financial institution is a risk associated with a data breach where personal information such as passwords and usernames are stolen, making accounts compromised. If a breach occurred, sensitive information would be accessed without authority from stakeholders of the company. Likelihood This cyber threat is likely because many cyber criminals are looking to steal credit card information and conduct unauthorized transactions with the cards. Severity. The severity of such a data breach is high as the cybercriminals might have access to private information such as the customer’s Social Security Number, which would never be changed. This would put the intruder’s life at risk at all times of getting compromised. Impact The impact of most data breaches is very significant. This is because intruders would rob a customer by breaking into his bank account do unauthorized transactions leaving the bank to cover for the risks caused. Cost A significant data breach will likely cost as customers’ confidential and sensitive information can be stolen, damaging the company’s reputation. Customer prosecutions might cost a data breach up to cost up to $1,000,000 or more, depending on the impact. Risk Assessment Matrix: Using a risk analysis matrix, identify where on a 3×3 risk diagram the risk would fall. Severity Likelihood 1 2 3 1 2 3 Critical business functions Mervin INC. is a financial institution where most of its critical operations include; Money transfer – customers conducting business via bank accounts need to transfer money from one bank to another, thus achieving successful business operations. Leading – Mervin INC. leads loans as an investment strategy, and various entrepreneurs are free to apply for loans at any given time. Record keeping – With many new customers registering and transactions taking place every minute, the company is entitled to keeping the records, thus helping maintain business ethics. Keeping customers’ money safe – This is one of the primary activities that the bank carries out. If the bank does not keep customers’ money safe, it can be challenging for customers to trust it, thus making it have a low market share. Fund distribution – Banks must distribute funds to their customers depending on their needs and remain active depending on their money flow. Security – for customers to believe that the bank is safe to keep their funds, there is a need for effective security authentication, thus allowing customers to access their accounts successfully. (Kuerban et al., 2020) Enforcement focuses on suspending accounts of those who attempt to conduct illegal activities using bank transfers associated with fraud or theft. This policy allows the company to track funds associated with the fraud. Exchange rates – the company allows its customers to receive funds from all parts of the world, and it allows conversion at a fee. Sound business practices – this role is critical to the company as it allows it to safeguard the money in the bank. Sound business practices involve good business-making strategies, such as customers leading loans and those not leading. Company organization chart The organization chart plays a crucial role in Mervin INC. It allows various employees to be allocated various tasks depending on the management level, thus allowing it to serve its customers effectively. The company’s organizational chart starts from top management, where powers are effectively distributed towards the lowest level of the organization. Below is the organizational chart of the organization. Reference Kuerban, M., Maihemuti, B., Waili, Y., & Tuerhong, T. (2020). Ecological risk assessment and source identification of heavy metal pollution in Urumqi, China vegetable bases, using the positive matrix factorization (PMF) method. PloS one, 15(4), e0230191. Kumar, A. (2020). Business continuity plan. South Asian Journal of Engineering and Technology, 10(2), 1-4. Mbiru, J., Wickham, M. D., & Ayentimi, D. T. (2020). Introducing an entrepreneurial project management model. The Journal of Modern Project Management, 7(4). Stein, V., & Wiedemann, A. (2018). Risk governance: primary rationale and tentative findings from the German banking sector. In Current issues in corporate social responsibility (pp. 97-110). Springer, Cham.
Assessment Description: A company profile helps to convey a business’ value proposition to customers and identifies the services and products the company offers. A company profile is a window into the
17 Business Continuity Plan (BCP) – Phase 3 Student’s Name: University Course: Professor’s Name: Part 1: Issue-Specific Security Policies Use of personal equipment on your company’s network (BYOD) Issue Statement: The use of personal equipment on the company network (BYOD) raises security concerns due to the potential for increased risks to the confidentiality, integrity, and availability of company data. Statement of the Organization’s Position: The company does not allow the use of personal equipment on the company network. Applicability: This policy applies to all company employees. Roles and Responsibilities: Employees are responsible for ensuring that their personal equipment does not connect to the company network. Compliance: Employees who violate this policy may be subject to disciplinary action, up to and including termination of employment. Points of Contact: Questions about this policy should be directed to the IT Department. Supplementary Information: To help you understand what is and is not acceptable when you bring your own device (BYOD) to connect to your company’s network, we’ve provided the following information. Acceptable Use; You are responsible for ensuring that your device complies with your company’s acceptable use policy. Your device must not be used to: access, store or distribute inappropriate or illegal material carry out any activity that is likely to jeopardize the security of the network. Bring the company into disrepute; You must also take reasonable steps to protect your device from malware and keep it up to date with security patches. Restrictions on Use; company may place restrictions on how you use your device on the network. For example, they may: restrict or prohibit access to certain websites or content; restrict or prohibit use of certain applications or services, require you to use certain security measures, such as encryption require you to install certain software or updates. Internet Access Policy Issue Statement: The purpose of this policy is to define the acceptable use of the internet and to ensure the security of the organization’s information assets. Statement of the Organization’s Position: The organization views the internet as a valuable resource that can be used to support the organization’s business objectives. However, the organization recognizes that the internet also poses risks to the security of its information assets. The organization will take measures to mitigate these risks while still allowing employees to use the internet for business purposes. Applicability: This policy applies to all employees of the organization. Roles and Responsibilities: All employees are responsible for adhering to this policy. Compliance: Compliance with this policy is mandatory. Points of Contact: The point of contact for this policy is the IT department. Supplementary Information: The organization’s firewall policy and acceptable use policy should be consulted for more information on the use of the internet. Personal use of company equipment Issue Statement: The unauthorized personal use of company equipment may result in the disclosure of sensitive information, damage to equipment, and decreased productivity. Policy Statement; The organization’s position is that personal use of company equipment is allowed, provided that it does not interfere with work duties and responsibilities, and that the equipment is used in accordance with this policy. Applicability; This policy applies to all employees of the organization. Roles and Responsibilities; Employees are responsible for using company equipment in accordance with this policy. Compliance; Compliance with this policy is mandatory. Points of Contact; The point of contact for this policy is the Human Resources department. Supplementary Information; A person may use the company equipment for personal use if the use is consistent with the company’s guidelines and the use does not interfere with the company’s business activities. A person may use the company telephone for personal use if the use is consistent with the company’s guidelines and the use does not interfere with the company’s business activities. Removal of organizational equipment from your company’s property Issue Statement: The unauthorized removal of organizational equipment from company property poses a significant security risk. Statement of the Organization’s Position: The unauthorized removal of any organizational equipment from company property is strictly prohibited. Applicability: This policy applies to all organizational equipment, including but not limited to computers, laptops, smartphones, and tablets. Roles and Responsibilities: All employees are responsible for ensuring that organizational equipment is not removed from company property without prior authorization. Compliance: Employees who violate this policy may be subject to disciplinary action, up to and including termination. Points of Contact: For questions or concerns regarding this policy, please contact the IT Department. Supplementary Information: Organizational equipment must be properly secured at all times to prevent unauthorized removal. Issue-Specific Security Policies Issue Statement: The unauthorized use of unofficial software on organizational devices poses a serious security risk. Unofficial software may not be properly vetted and could contain malware or other security vulnerabilities. Statement Of the Organization’s Position: The organization takes a strict stance against the use of unofficial software on any organizational device. Only official, approved software may be installed and used on these devices. Applicability: This policy applies to all organizational devices, including but not limited to laptops, desktop computers, smartphones, and tablets. Roles And Responsibilities: All users of organizational devices are responsible for ensuring that only official, approved software is installed and used on these devices. Compliance: Users who violate this policy may be subject to disciplinary action, up to and including termination of employment or contract. Points Of Contact: For questions or concerns about this policy, please contact the IT department. Supplementary Information: Use of unofficial software to access, copy, or distribute copyrighted works is unlawful. The Department has determined that the only lawful method of accessing the government-sponsored Federal Web site that contains the NEIS software is through the use of the Microsoft Internet Explorer browser software. Part 3: Incident Response Introduction Poor mishandling of an incident can significantly negatively impact Mervin INC., its reputation, and its customers. The financial industry is a sensitive area of operation that demands high levels of computer system security and management of incidents. In order to mitigate the damage caused by an incident, Mervin INC. must have a plan in place to quickly and effectively respond. In recent years, there has been a surge in incidences within the financial industry. They are targeted due to the sensitive nature of the information that is stored by financial institutions. This information can include customer data, financial records, and other confidential information (Green et al., 2020; Idler et al., 2014). An incident response plan (IRP) outlines the steps that an organization will take in the event of a data breach and provides a framework for how the organization will manage the situation. In this essay, actions to be taken in case of a ransomware attack, power failure, and ISP failure will be evaluated. The process of managing a situation where a location of a business is rendered useless will also be evaluated. Ransomware attack on one PC/user Ransomware is a type of malware that encrypts a user’s files and demands a ransom to decrypt them. There are many ways that ransomware can infect a system, such as through phishing emails, infected websites, or malicious advertisements. Once a system is infected, the ransomware will encrypt the user’s files and demand a ransom to decrypt them. Ransomware can be very difficult to remove, and sometimes the only way to remove it is to restore the system from a backup. It can be a very costly affair, and it can also lead to the loss of sensitive data (Naseer et al., 2020). Additionally, ransomware can also result in the disruption of business operations, and it can be difficult to recover from such an attack. According to the Incident Response Plan (IRP), Mervin INC should not pay the ransom and to try to remove the ransomware through its in-house IT teams. There are many tools and resources available to help remove ransomware. If the company does not have a backup of files, then they might have to pay the ransom to get your files back. However, it should only pay the ransom if it is sure that it will be able to get the files back. When attacked by ransomware, Immediately disconnect the affected PC/user from the network. Do not pay the ransom. Restore the affected PC/user from backups, if available. Therefore, it is important for the company to find a cloud computing vendor who is proven and tested to provide a backup system. Run a malware scan on the affected PC/user. It will identify other gateways that might get used to attacking the system. Once all the red flags have been evaluated, the systems can be taken back online to provide services (Green et al., 2020; Naseer et al., 2020). Change all passwords for the affected PC/user. All affected employees should get taken through development programs to ensure they understand the dangers of poor password management are identified. After ensuring all the systems are audited, all the affected relevant personnel that might help prevent future attacks are notified. It can include external IT vendors and IT specialists. It will ensure continuous monitoring of the affected PC/user continues for identification of any unusual activity. Since attackers will usually target a specific department or computers at Mervin INC., it will be easy to monitor unusual activities. They will do this by researching the company and finding out as much as possible about its systems and networks. Therefore, an audit of employees to weed out rogue employees is necessary. Power failure According to the incident response plan (IRP), power failures are inevitable in any organization. Therefore, Mervin INC should implement the IRP as a mandatory part of its strategy. Otherwise, there will be no excuse for failures. Power failure can have a major impact on any organization, large or small. Disruption of critical operations can cause significant financial losses, damage to reputation, and even loss of life (Idler et al., 2014). It is important to have a well-developed incident response plan (IRP) in place to minimize the impact of a power failure and ensure a quick and effective response. The objectives of the IRP during a power failure should be to: 1. Minimize the impact of a power failure on operations. Therefore, backup generators and systems should be automatic 2. Restore power as quickly as possible. Emergency services should be reached, and the cause of the power failure should be identified. 3. Ensure the safety of employees and customers. The process of guaranteeing employees and customers are safe is through following the set guidelines on evacuation and closing of computer systems in a power failure. The IRP objectives apply to Mervin INC to all power failures that occur at the organization, regardless of cause. Any form of limitation should have a special clause in the IRP. Otherwise, confusion will be inevitable. The incident commander will be responsible for the overall coordination of the response effort. Other key personnel will include the following: 1. Facilities manager: responsible for assessing damage and coordinating repairs 2. Safety officer: responsible for ensuring the safety of employees and customers 3. IT manager: responsible for coordinating the recovery of critical systems 4. Communications manager: responsible for coordinating internal and external communications 5. Procedures The following procedures should be followed in the event of a power failure according to the incident response plan: 1. Notify all employees of the power failure and instruct them to follow safety procedures 2. Evacuate all customers from the premises. It should be organized to prevent the panic that will make the situation even worse. 3. Isolate all damaged equipment and systems. The process should be systematic; otherwise, gaps and inconsistencies will lead to crucial financial services failing. 4. Notify the utility company and request the restoration of power (Idler et al., 2014). 5. Notify local authorities as appropriate. If the power failure was caused by rogue employees, then legal action can be taken. 6. Begin recovery procedures for critical systems. 7. Notify employees of the status of repairs and expected return to service. Communication during a power failure should be clear and concise. All employees should be made aware of the incident and instructed to follow safety procedures. Customers should be notified of the power failure and evacuated from the premises. Local authorities should be notified as appropriate. The utility company should be contacted to restore power (Naseer et al., 2020). Communication will also ensure sensitive infrastructure is not disrupted as outsourced vendors will fill the gaps. Mervin INC financial services will continue uninterrupted and save reputation and reduce overhead costs associated with litigation processes that might arise. A power failure can have a major impact on any organization. It is important to have a well-developed incident response plan in place to minimize the impact of a power failure and ensure a quick and effective response. ISP failure The IRP identified it applies to all ISP-related outages, including those caused by hardware or software failures, power outages, network outages, and natural disasters. It ensures a holistic take on the incident is implemented. The most important step is identifying an ISP failure. Otherwise, if unrecognized, it will cause the failure of systems, and it might be too late to respond. ISP failures can be notified in a variety of ways, including through customer support channels, network monitoring tools, and social media. During an incident, the customer support channels will receive complains and feedback from Mervin INC’s clients. They use them to reach the IT team and IR team. Network monitoring tools can also send automatic messages to vendors to notify them of an outage. Once an outage of ISP is identified, the IRP states that the appropriate personnel should be reached. This may include the ISP support team, network administrators, and/or the incident response team. They will identify the scope of the outage. This may include identifying the affected locations, services, and customers. The support team can begin collecting information about the outage (Idler et al., 2014; Naseer et al., 2020). This may include gathering logs, network data, and customer reports. The last step is to activate the incident response plan. After the initial response has been completed, the following steps should be taken to recover from the ISP failure: 1. Notify customers of the outage and estimated recovery time. It will eliminate anxiety and ensure a negative attitude towards the company does not develop. 2. Work with the ISP to resolve the issue. This may include troubleshooting hardware or software, implementing workarounds, and/or updating configurations. 3. Test the recovery procedures. This may include testing connectivity, performance, and functionality. 4. Implement the recovery procedures. 5. Monitor the recovery process. This may include monitoring system performance and customer satisfaction. 6. Update customers on the recovery status. 7. Close the incident. The IRP has also provided guidelines to prevent future ISP failures. They help to reduce overhead costs and ensure accountability is improved. The leadership of Mervin INC can use the incident as a learning opportunity. Employee burnout and irregular management of ISP failure in the future will be prevented (Idler et al.,2014). Prevention of future ISP failures begins with reviewing the cause of the outage. This may include root cause analysis, post-mortem analysis, and/or lessons learned. Secondly, implementing changes to prevent similar outages is necessary. The change in the status quo leads to increased alerts of the incident. This may include changes to hardware, software, configurations, processes, and/or procedures. Thirdly, test the changes. This may include testing in a lab environment and/or in a production environment. If the piloting stage is successful, the full implementation of the new changes is necessary. Monitoring the changes for a specific period of time is necessary. This may include monitoring system performance and customer satisfaction. Key performance parameters will act as a guide to the final audit of the IRP (Naseer et al., 2020). If there are major changes, then updating the incident response plan is necessary for future reference. This incident response plan (IRP) provides guidance on how to respond to an ISP failure. This IRP should be reviewed and updated on a regular basis to ensure that it remains current. Challenges of an Incident Response Lack of preparedness: Most organizations are not prepared for incident response. They lack the necessary policies, procedures, and tools in place to respond effectively to an incident. Lack of awareness: Many organizations are unaware of the importance of incident response or the potential benefits it can provide. As a result, they are often unprepared to deal with incidents when they occur. Lack of training: Many incident response teams lack the necessary training to respond effectively to incidents. This can lead to delays in response time and ineffective responses (Idler et al., 2014; Green et al., 2020). Lack of resources: Incident response can be resource intensive, and many organizations lack the necessary resources to respond effectively to incidents. This can include personnel, financial, and technical resources. Complexity: Incident response can be complex, and many organizations lack the necessary expertise to respond effectively to incidents. This can lead to delays in response time and ineffective responses. Disaster Ruining Current Business Location The first step is to identify what critical business functions need to be maintained during and after a disaster. The second step is to develop plans and procedures for how those critical business functions will be maintained. Reaching out to incident response experts is necessary. Thirdly, identify what resources (e.g., people,0 equipment, facilities, etc.) are needed to maintain those critical business functions. It will ensure accountability and transparency in the process, which can be chaotic if not efficiently monitored. The fifth step is to identify any risks that could impact the ability to maintain those critical business functions and develop mitigation plans accordingly. The risk management process is technical and might demand a separate budget to not only hire experts but also increase technology integration to support services. Next is to develop and implement a communication plan to ensure all stakeholders are kept up-to-date on the status of critical business functions during and after a disaster. The next move is to test and exercise the plans and procedures regularly to ensure they are effective and up-to-date. Testing should involve a small portion of the business operations to ensure gaps that can be used to attack a system are not opened (Naseer et al., 2020). Monitoring and updating the plans and procedures regularly as needed based on changes in the business, environment, etc., are followed. The last step is reviewing and revising the plans and procedures regularly to ensure they are still effective and address any new risks that may have arisen. Therefore, the disaster will be well-managed all resources will be protected. As the business looks for a new location, its operations will still be guaranteed. Therefore, customers will not be lost. Conclusion In conclusion, the purpose of an incident response plan is to provide a structured approach for responding to an information security incident. The plan should be tailored to the organization’s specific needs and should be reviewed and updated on a regular basis (Green et al., 2020). An incident response plan either for ransomware, power failure, or ISP failure should include the following components: 1. A list of incident response team members and their contact information 2. A list of incident types and associated response procedures 3. List of tools and resources needed to execute the response plan 4. A communications plan for internal and external stakeholders 5. A post-incident review and improvement process An incident response plan should be tested periodically to ensure that it is effective and up-to-date. The plan should be reviewed and updated after each incident to ensure that it remains relevant and effective. References Ahmad, A., Desouza, K. C., Maynard, S. B., Naseer, H., & Baskerville, R. L. (2020). How integration of cyber security management and incident response enables organizational learning. Journal of the Association for Information Science and Technology, 71(8), 939-953. https://asistdl.onlinelibrary.wiley.com/doi/abs/10.1002/asi.24311 Harsch, A., Idler, S., & Thurner, S. (2014, May). Assuming a state of compromise: A best practise approach for SMEs on incident response management. In 2014 Eighth International Conference on IT Security Incident Management & IT Forensics (pp. 76-84). IEEE. https://ieeexplore.ieee.org/abstract/document/6824083/ Staves, A., Balderstone, H., Green, B., Gouglidis, A., & Hutchison, D. (2020, May). A framework to support ICS cyber incident response and recovery. In the 17th International Conference on Information Systems for Crisis Response and Management. https://eprints.lancs.ac.uk/id/eprint/143070/

Writerbay.net

When writing your assignment, we aim to help you get an A, not just beat the deadline.


Order a Similar Paper Order a Different Paper