logo

Contingency Plan for Hacking Problem

   

Added on  2022-11-27

4 Pages750 Words124 Views
 | 
 | 
 | 
Running head: CONTINGENCY PLAN FOR HACKING PROBLEM 1
Contingency Plan for Hacking Problem
Name
Professor
Course
Date
Contingency Plan for Hacking Problem_1

CONTINGENCY PLAN FOR HACKING PROBLEM 2
Contingency Plan for Hacking Problem
The attack that has been selected involves APT10 hacking group based in China. A
hacking operation for a bank can affect the banking operations and business in general leading to
huge losses of money and time. To avoid this issue a contingency plan is required (Williams,
2018). A contingency plan involves a coordinated strategy that involves procedures, plans and
technical measures enabling IT system, data and operations recovery after being disrupted. It
generally involves some approaches to have the IT services restored. Examples of such
approaches include the recovery of IT operations using alternative equipment (s), carrying out
some or all businesses processes affected using non-IT means acceptable for disruptions that are
short term.
The plan includes first updating everything related to IT systems recovery. This first step
involves downloading and updating the business firewalls and measures of security to ensure that
an up-to-date system. It includes having the operating systems updated (Condra, 2017). A breach
operation success is exponentially huge against old technologies and upgrade is absolutely
necessary as it may cost nothing. Having a well operational DRP (disaster recovery plan) for
issues such as malware and ransom-ware is also part of the contingency plan. Employees have to
go through the plan policies. The DRP minimizes disruption and restores system operations as
fast as possible, ensures data and security are recovered, enables reliable and consistency in
processes of backup such as the cloud storage or server system. It also restores the business
quickly tor run normally.
The third step involves setting policies and education for employees. There are various
policies that the business such as a bank need to be informed about but few know them. These
policies include policies for password updates, computer using policies, protocols for offsite
Contingency Plan for Hacking Problem_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security for Business Continuity
|6
|1387
|568

Cyber Security for Business Continuity
|7
|1390
|191

Disaster Recovery Plan Analysis
|5
|1057
|13

Ransomware & Malware
|5
|581
|276

CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

Ransomware Attack in University Report 2022
|8
|1910
|20