logo

Untangling IT Assets at University

   

Added on  2022-08-20

6 Pages932 Words57 Views
Running head: INFORMATION SECURITY POLICY MANAGEMENT
INFORMATION SECURITY POLICY MANAGEMENT
Name of the Student
Name of the university
Author note

1INFORMATION SECURITY POLICY MANAGEMENT
Disaster recovery plan:
Description Example When it was
deployed
Time Frame
Conducting an asset
inventory
All the IT assets at
the residence require
of an inventory.
Just after any
incident happens.
This step is required
as this will help in
untangling the
complexity of the
environment
(Wallace & Webber,
2017). List all the
different assets.
Mapping where each
of these assets are
physically placed
will help.
Recovery on short
term basis
Performing a risk
assessment
Imagining the worst
case scenario
This will be help in
understanding how
the incident will have
an effect on the IT
assets.
Long term basis
Defining the
criticality of all the
applications and the
Classifying the data
and associated
applications as per
This will help in
looking up for
commonalities and
Short term basis

2INFORMATION SECURITY POLICY MANAGEMENT
data their critical nature. group all assets so
that business
continuity can be
ensured after an
incident.
Defining the different
recovery objectives
The different IT
assets will be having
different recovery
objectives.
This is essential as it
is obvious that
different assets will
have distinct
objectives in case of
recovery.
Short term basis
Determining the
appropriate tools as
well as techniques
Choosing right tools
and associated
techniques that can
be made use of in the
process
(Kirschenbaum,
2019).
This is important as
there are many
options that are to be
chosen form and thus
wise decision should
be taken.
long term basis
Documenting the
plan
Keeps the strategy
ready in hand
This is required so
that at times of panic
a strategy is ready in
hand.
short term basis

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
INFORMATION SECURITY POLICY MANAGEMENT
|6
|886
|26

Case Study on Computer Operations
|18
|4463
|95

Information System Security: For a Case Study
|13
|2480
|309

Capital One Data Breach Incident
|24
|6782
|52

Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address
|16
|4641
|349

Necessity of Securing Backups and Off-Site Storage
|5
|807
|305