logo

Contingency Planning for Information Security and Policy Documents at Denisovan Medical Supplies

   

Added on  2023-06-18

15 Pages4012 Words245 Views
Case study scenario
Table of Contents

Questions 1.......................................................................................................................................1
A. List and briefly describe the components of contingency planning for information security
................................................................................................................................................1
B. Describe the role of Incident Response in the implementation of a contingency plan
making sure to discuss its interaction with Disaster recovery and Business Continuity........2
C. After a DOS attack incident affecting the Research and Developments Network at
Denisovan, briefly discuss what they should included in their After-Action Review (AAR)3
Question 2........................................................................................................................................3
A. Write a paragraph explaining the reasons why formal policy statements are essential at
Denisovan Medical Supplies..................................................................................................4
B. Describe what elements compliance statements should contain in a policy document.....4
C. Give Two examples of Policy Documents that would be required at Denisovan Medical
Supplies, provide justification for your choice.......................................................................5
D. Suggest a program to ensure awareness and compliance to the policy.............................6
E. Describe how you could determine the success of your program......................................7
Question 3........................................................................................................................................7
REFERENCES................................................................................................................................9

Questions 1
A. List and briefly describe the components of contingency planning for information security
The information contingency planning system main refers to a coordinated way of strategy
that keeps on involving the plans, procedures along with all the technical measures to enable that
easy and continuous recovery of the information systems, operations and other form of data after
any kind of disruption (Shipman, 2021). The key components of contingency planning for
information security are listed and briefly described as below:
Preparation analysis- It is vital that a contingency planning must be based on sound
analysis of the risk in a specific context thus, the preparation analysis is mainly to reflect
on the nature and frequency of the hazards and threats including all the vulnerabilities
from which information needed security.
Response planning- Based on the analysed threats and vulnerabilities for the information
next step is to agree upon the specific role and responsibilities that is important and viral
to effectively react on the risk and having a proper contingency planning to response and
effectively overcome that threat.
Implementing preparedness- This component of the contingency planning comprises of
the having an effective consolidating process along with a proper follow up action. Under
this component the Simulation and response are exercised that are help full in identifying
the key strengths and weaknesses, as well as meeting the training is required so that all
participants are able to meet their identified responsibilities (Hsia, 2021).
Beside these some other key components of contingency planning for information security
are also there which are listed and briefly described as below:
Disaster recovery plan- An effective contingency planning for information security
comprises of a written procedure that supports the recovery and protection of the
information at the rime of some major event or disaster.
Emergency Mode operation plan- This component is also known as the business
continuity plan that focus on having the list of guideline and procedure that supports the
sustaining if the normal business operation at the time of some major information
interruptions.
1

Data backup plan- It is one of the core component of the contingency panning for
information security as it supports a quick backing up of the all the critical information
and file to prevent the loss of information and also leads to improved information
security (Zimmer, 2021).
B. Describe the role of Incident Response in the implementation of a contingency plan making
sure to discuss its interaction with Disaster recovery and Business Continuity.
It has been seen and analysed that a vital role is being played by the incident response in
the effective implementation of the contingency plan as it helps in maintaining the organisational
loss by the way of resolving and mitigating the exploited vulnerabilities, restore services and
processes and reduce the risks that future incidents pose. Further, it has been also seen and
analysed that the incident response supports and helps in a faster detection and respond towards
the breach of data and even at the time when any security incidents take place (Sindhuja, 2021).
Thus, the incident response leads to reduction in positional loss through having a significant and
positive impact on the data protection and also build and sets out a higher customer trust,
improved organisational reputation and reduce the projected loss.
The Incident response plays vital role in the preparation of the potential security incident
that is important for having a successful and improved response towards contingency planning.
Beside this, an early identification of any security breach is also made by the incident response
that helps and support in removing the security threats. Along with this, an effective incident
response also plays a vital role in improved implementation of the contingency plan through
leading a better entailment, eradication, recovery and better lessons for early identification and
mitigation of risk (Sheaffer, Boyd & Cropp, 2021). Further, it has been analysed and seen that
the incident response act as a balance between Disaster recovery and Business Continuity
through leading an improved coordination and collaboration among the two. It has been analysed
and observed that the Incident response leads to early identification of the contingency and
communicate it with the disaster recovery department and personnel to minimize the loss. At the
same time, the incident response also ensures that all the other business operation should remain
unaffected from the threats and risk thus, plays a vital role in ensuring the smooth continuity of
the business operation at the time of contingency (Kaur, Habibi Lashkari & Habibi Lashkari,
2021).
2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Outline for a Security Program Management Tabletop
|9
|669
|25

Risk and Vulnerability Management in the Organization
|11
|885
|480

CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22

Network Security Plan Template- cyber security
|3
|451
|2880

Importance of Contingency Plan Assignment
|7
|999
|48

Business Continuing Plan and Disaster Recovery
|8
|1605
|58