Module 2 Assignment

docx

School

Saint Leo University *

*We aren’t endorsed by this school

Course

510

Subject

Communications

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by dowlingdad88

Report
Joshua Dowling COM 510 Saint Leo University Module 2 Assignment Chapter 3 1. Using a Web search engine, find an article from a reputable source, published within the past six months, that reports on the risk coming from inside the organization compared to the risk coming from outside the organization. If the article notes that this relative risk is changing, how is it changing and to what is the change attributed? https://www.techtarget.com/searchsecurity/definition/What-is-risk-management- and-why-is-it-important One of the ways in which this article addresses change is within the recent Covid- 19 pandemic. Initially, the pandemic manifested itself greatly in the supply chain worldwide. That issue, specifically started to pose an external threat to the health and safety of employees, doing business, and interacting with customers and corporations. Because of the drastic measures and complete change in everyday operations due to the pandemic, “many companies, business executives and the board of directors are taking a fresh look at their risk management programs.” A large business risk that has been evolving since the pandemic is the work-from- home/remote opportunities that businesses have been trudging through. 3. Search your institution’s published documents (or another organization’s), including its Web pages. Locate its values, vision, and/or mission statement, as well as strategic goals. Identify any references to InfoSec. Also look for any planning documents related to InfoSec. https://www.saintleo.edu/about/mission-values There are no references to infosec or cybersecurity in the main page of the school’s mission or value statements. I did not find any documents related to infosec planning. Chapter 10 3. Using a Web search engine, visit one of the popular disaster recovery/business continuity sites, such as www.disasterrecoveryworld.com, www.drj.com, www.drie.org, www.drii.org, or csrc.nist.gov. Search for the terms hot site, warm site, and cold site. Do the provided descriptions match those of this chapter? Why or why not? From DRJ.com Hot Site: A facility equipped with full technical requirements including IT, telecoms and infrastructure, and which can be used to provide rapid resumption of operations.
Cold Site: An environmentally equipped facility that provides only the physical space for recovery operations while the organization using the space provides its own office equipment, hardware and software systems and any other required resources to establish and continue operations. A site (data centre/work area) equipped with appropriate environmental conditioning, electrical connectivity, communications access, configurable space and access to accommodate the installation and operation of equipment by key employees required to resume business operations. Warm Site: An alternate processing site which is equipped with some hardware, and communications interfaces, electrical and environmental conditioning which is only capable of providing backup after additional provisioning, software or customization is performed. A designated standby site equipped and serviced to a level which will allow the organization to resume essential operations before their non-availability threatens business viability. From Textbook Hot Site : A fully configured computing facility that includes all services, communications links, and physical plant operations. Hot sites are used for BC operations. Cold Site: A facility that provides only rudimentary services, with no computer hardware or peripherals. Cold sites are used for BC operations. Warm Site: A facility that provides many of the same services and options as a hot site, but typically without installed and configured software applications. Warm sites are used for BC operations. I would say that both sets of definitions mirror each other. The Disaster Recovery Journal does go into more detail. I think that has to do with the clients they have. For the purposes of this class, the textbook uses a more general definition that can be adapted and added to as needed. 4. Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur: Virus attack Disconnect any infected computers linked to network to prevent further spread of the virus. Run anti-virus software to detect and remove virus. Restore files from a backup if necessary. Update antivirus software and strengthen security measures to prevent future attacks. Power failure Shut down computer to avoid damage from sudden power loss. Add battery backup (UPS) to help provide temporary power; enables safe shutdown during power outages. After power is restored, turn on computer and check for hardware or
software issues that may be present because of sudden power loss. Fire Ensure personal safety and evacuate the premises adhering to an established emergency protocol. Contact emergency services and let them know about the fire. Do not attempt to retrieve the computer or any other belongings until authorities declare it safe. Burst water pipe Immediately shut down and unplug the affected computer to prevent electrical damage. Move the computer and other electronic equipment away from the water source. Fix the burst pipe and ensure the affected area is properly dried before attempting to use the computer again. ISP failure Check for notifications from ISP regarding outages. Contact ISP to report and troubleshoot issue. If available, use other sources to connect to internet. What other scenarios do you think are important to plan for? Software and/or application malfunction Natural Disasters; such as hurricane, tornado, earthquakes Unauthorized access Hardware failure. 5. Look for information on incident response on your institution’s Web site. Does your institution have a published plan? Identify the areas in an academic institution’s contingency planning that might differ from those of a for-profit institution. As of 1/28/24, there are no published plans for incident response. There are also no known contingency plans listed that relate to disaster recovery or business continuity. This is vastly different than a for-profit organization because those types of organizations have too much to lose if a disaster occurs. Recovery/Continuity plans have to be a part of the strategy.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help