Preview

Week 4 Assignment 3

Satisfactory Essays
Open Document
Open Document
316 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 4 Assignment 3
BCP Outline and Table of Contents as per BIA

IS427: Information Systems Security Capstone Project

Daniel Jesse McConnell

11/24/13

Now is the point of the RFP that we start to think outward in terms of continuity after an event occurring. This step is known as Business Continuity Plan (BCP), which is outlined directly from the preconceived Business Impact Analysis (BIA).
Critical Applications and Function
Required IT Resources
Domain Name Server (DNS) Primary/Secondary
DNS Servers, Wide Area Network (WAN), and Local Area Network (LAN)
Email - Outlook 365 (2012)
Microsoft Office/extension
Payroll Management- ADP
ADP/Web Managed
Client Facing Service Application
Application/Database/LAN Servers
Tax Office Application
Application/Database/LAN Servers
Emergency Management Application- Quick books
Intuit Managed
Emergency notification service- Outlook 365, Soft and Physical Phones.
Microsoft/ATT Managed
Judicial records database
Application servers, database servers, and LAN
Public records database
Web servers, WAN, LAN, and application servers
Emergency services intercommunication
Web servers, WAN, LAN, and application servers
Department of motor vehicles applications
Application servers, database servers, and LAN
Electronic payment system
Web servers, WAN, LAN, and application servers
Public safety management system
Application servers, database servers, and LAN
Remote access authentication
Authentication servers, WAN, and LAN

We must build upon the knowledge we obtained from the table above to create the Business Continuity Plan (BCP) outline.
Item
Details
Resources
Outlook 365
Main Email Client
Web Service maintained by Microsoft.
ADP
Pay Roll Client
Web Service maintained by ADP.
QuickBooks
DB Software/Tax Information if needed/ Emergency go to in order to maintain records.
Cloud Storage up to 32 Gbs provided by Intuit.
SoftPhones
ATT- IP- Phones
Managed remotely by ATT, records maintained in their system if mainframe is



Cited: (2012). Request for Proposals for Information Security Assessment Services (isas). Sudburry, MA: Jones & Bartlett Learning.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events. Management's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 10 Assignment 4

    • 714 Words
    • 3 Pages

    2. Solving the problem by using Solver of M S Excel, the answer report is given below:…

    • 714 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore.…

    • 417 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    ISO 27002: Code of Practice for Business Continuity Management. Industry Standards NIST 800-34  Contingency planning  NFPA 1600  Standard on guide for information Disaster/Emergency Technology systems. management and  Seven steps process for BCP and DRP projects. …

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Is 305 Week 4 Quiz

    • 415 Words
    • 2 Pages

    Describe and list four elements of a BCP. Identify critical equipment necessary for the business mission. Identifying critical personnel necessary for the business to return to normal operations of the business. Conduct a BIA, determine the impact on the business if systems were unavailable. Maintenance and updating of the BCP as changes are made to the network.…

    • 415 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    week 1 assignment 1

    • 256 Words
    • 2 Pages

    A landline telephone (also known as land line, land-line, main line, homophone, landline, fixed-line, and wire line) refers to a phone that uses a solid medium line such as a copper wire or fiber optical wire for transmission…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 2 Assignment 2

    • 289 Words
    • 1 Page

    Which input/output devices will you be using in the next one to three years as…

    • 289 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    The scenario I am proposing to test the BCP for the company is a hacker scenario. A hacker attempts to break into the network and access delicate information that shouldn’t be accessible by anyone outside of the company. The combination of business and IT transformation, compliance and governance demands and the onslaught of security threats continues to make the job of safeguarding data assets a serious challenge for organizations of all types—from multinational corporations to independent merchants to government entities. The purpose of this test would be to see how quickly the attack is detected and stopped in addition to tracking to discover the identity of the hacker.…

    • 815 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 4 Assignment

    • 338 Words
    • 1 Page

    1. A large number of fish and marine plants may die, the dead fish and birds may liter the water and beaches, their decomposing bodies deplete the waters oxygen. The El Nino event is often a cause for droughts causing more brush fires and crop failures. When it comes to wind; the El Nino decreases the strength of tropical storms and hurricanes.…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 5 Assignment 1

    • 568 Words
    • 3 Pages

    I knew I needed to get glasses so that I could read for extended periods of time so I felt really compelled to borrow more money for them so I chose a pair that was fashionable as well as comfortable.…

    • 568 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Week 4 Assignment 1

    • 396 Words
    • 2 Pages

    Describe your outcome from this week’s MyFoundationsLab® assignment. The outcome from this week’s MyFoundationsLab assignment were good but could be better. The assignment pointed out the importance of previewing and marking your readings. It also pointed out the importance of limiting distractions and setting study goals. I am now better prepared to focus and concentrate on my readings so I can retain more information.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Akamai Case

    • 1182 Words
    • 5 Pages

    1. Who are major competitor(s) to Akamai? Focus on one major competitor. Do some research and outline key differences between Akamai and its competitor in terms of services, pricing, technology, target customer etc. Provide some numbers if possible.…

    • 1182 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    REVIEW QUESTIONS: Page 230 1) What is IT infrastructure and what are its components?  Define IT infrastructure from both a technology and a service perspective. Technical views – It is defined as shared technology resources which provide the platform for the company’s’ specific information system applications.…

    • 2518 Words
    • 11 Pages
    Powerful Essays