The Importance Of Designing A Security Plan

Improved Essays
Disaster plans are a very important part of designing a security plan. Disasters come in several types. There are physical disasters like earthquakes, tornados, hurricanes, and floods. Then you have non-physical such as data breaches and system failures. In order for us to complete our security plan we need to create a disaster plan to help us should an unfortunate event occur. The first step in creating a disaster plan is to conduct a business impact analysis (BIA). To conduct a BIA, we must first start by figuring out all the systems and applications we use and where each of them reside.(searchhealthit.techtarget.com) Then once we know what we have we take that information and then determine each one impact to the company should it go down and since we are a healthcare organization we have to include …show more content…
Then next we need to look at what vulnerabilities affect each one and come up with a plan to fix those vulnerabilities and implement that plan. (searchhealthit.techtarget.com) The next step is to look into backup programs and think about how and where we will store those backups. There are many programs available and the way I would work backups is to use a combination of disk-based backup and tape backups. You may be thinking why would we use two and two will be expensive. So, I will explain my reasoning behind this route. The tape backup is not enough on its own. The tape backups are one time backups so if you perform a backup at 10 you have 23 hours before another backup will occur. Should a disaster occur during that 23 hours everything new added after the 10pm backup will be lost.(searchhealthit.techtarget.com) Disk-based backups are continuous backups meaning they are always backing up all the new data. The

Related Documents

  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005). The final phase is watching out for new vulnerabilities and implementing fixes patches and updates in a timely matter to alleviate future compromises. Also in this phase, reports are created of errors that have occurred and prevention of new errors from rising. The web server attack can cause harm to an organizations name and brand. The consequences can be website damage and destruction, compromised information, alteration of data (users ' personal data), and web server infringement.…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    There are many different ways you can identify your risks. You can start by brainstorming with personnel and work on identifying which of your assets are at risk. Take for example the difference of a server to a workstation is terms of security. A server is more likely to contain more sensitive information on it than your typical workstation, so even though the workstations need to be secured, a stolen or compromised server would cause more damage and therefore needs to be placed hire on the risk chart. After you have identified your risks, you can then begin to develop a policy that will help to reduce or eliminate the risks.…

    • 1045 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The Importance Of Tornados

    • 1015 Words
    • 5 Pages

    Natural disasters are dangerous and many times random. It is important to have response plans in place to provide a structure for emergency personnel. In these situations it is important to have a command structure in place. Its at these times we rely on the preparedness plans that are in place and put them into action. Tornados are to be considered Catastrophic Disasters and would rely on that annex to help create a framework for the emergency personnel.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Veteran Nursing Process

    • 1234 Words
    • 5 Pages

    After collecting data the next step is to begin analyzing it and to determine which direction to go. In this case study a problem with patient safety was discovered. This brings us to the planning phase, which involves developing a plan for change; including resources, identifying supporters, opposers; and building a coalition. The proposed areas of change were the organizational culture and empowering local facilities and staff with tools, methods, and initiatives for patient safety improvement (McCarthy and Blumenthal, 2006). “The VA sought the cooperation of Congress, the Joint Council on Accreditation of Healthcare Organizations (JCAHO), and the unions that helped to define what acts would be subject to blame or punitive action” (McCarthy and Blumenthal, 2006, pp.…

    • 1234 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Modernizing Medicine Careers

    • 3056 Words
    • 13 Pages

    Fromm my viewpoint as an HR person, I will recommend that effective planning should be the watchword for the Modernizing Medicine Careers (MMC) going forward. The deployment of the right technology for recruitment would also be recommended for the MMC. Despite the fact that there was a test run on the online recruitment portal, the system still malfunctioned thereby leading to a failure on the recruitment process. This presupposes that the test run was inadequate vis-à-vis the kind of recruitment they were embarking on. I would further recommend that thorough investigations be carried out to ascertain what led to the crash of the system and subsequently proffer solutions that would guard against future reoccurrences.…

    • 3056 Words
    • 13 Pages
    Great Essays
  • Great Essays

    Human Dimensional Impacts upon Information Security Infrastructure William Fisher University of Maryland University College CSEC610 Cyberspace and Cybersecurity Professor Hall Abstract Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor. This paper…

    • 2361 Words
    • 10 Pages
    Great Essays
  • Superior Essays

    Cyber Attack Case Study

    • 956 Words
    • 4 Pages

    Once the critical business information is identified, a planned response needs to be identified as to how to protect that information. The protection plan may begin with the Information Technology (IT) Department with software but essentially it is individual responsibility of how the information is kept safe. Information is always vulnerable and people are looking to find ways to gain access. By having checks in place, if a hack does occur, the violation can be detected sooner and planning continues to prevent future attacks from happening again by devising a deflect plan, and how to go about defending in the future. Firewalls are put in place to keep individuals from hacking into the database at the place of my employment.…

    • 956 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    My main goal is to conduct a CIA Triad (Confidentiality, Integrity, and Availability) to the information system by providing and ensuring this is practiced by my employees. But before being able to manage these goals I would have to look deep into the company vulnerabilities and reduce any possible risk to an acceptable level. There are several decisions I can make upon the risk findings discover such as Risk Mitigation. In this process patches may be install to help reduce the risk or fix the problem that originated. With the standards, regulations, and policies implemented a guidebook will be form that will show the guidance to take if certain threats arise that can harm the company.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ebola Case Study

    • 958 Words
    • 4 Pages

    The risk of continued and uncontrollable spread of the virus in certain parts of the world will require continued laborious efforts of healthcare managers which may be expensive. Even with all precautions in place, there is every possibility that healthcare personnel can be infected. Hence, the Center for Disease Control and Prevention (CDC) has laid down some rules that will be followed. The healthcare managers will be at the helm of affairs; monitoring, managing, and training visitors. They will establish procedures for the monitoring and management.…

    • 958 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Security Countermeasures

    • 1615 Words
    • 7 Pages

    Internet and wireless devices are necessary to maintain along with monitoring power plants. While the benefits from networks are not in question, the security liability certainly is. As our society becomes increasingly dependent upon networks the loss of that capability will be profound. Moreover, taking into consideration the interlinked communication of all these automated systems unveils the reality of an attack on one system having a cascading and cataclysmic effect. Conversely, the answer to the emerging liabilities appears to reside in the application of cutting edge technology.…

    • 1615 Words
    • 7 Pages
    Great Essays