Disaster Recovery/Business Continuity Plan (DR/BCP)

Great Essays
Purpose
The main purpose of this paper is to elaborate issues related to security, interoperability, and operations of Bank solutions Inc. Disaster Recovery/Business continuity plan (DR/BCP) by prioritizing the selected requirements based on immediate need, security posture, complexity, resource availability, and cost. The necessity of applicable government regulations and the use of security controls recommended by the NIST special publication 800-53 is also explained to operate daily activities of Bank solutions Inc. in an efficient and effective way by protecting the confidentiality, integrity, and availability (CIA Triad) of assets, individuals, data, organizations, systems, and processes.
Definition
Financial Institution: “It means any
…show more content…
Lack of knowledge to implement DR/BCP by critical plan participants
It is clearly mentioned that Bank solutions Inc. has not provided any training to properly implement DR/BCP during disaster and the critical plan participants are unaware of using DR/BCP properly. It is very critical to define the roles and responsibilities of each individual during disaster recovery to cope with immediate need.
Prioritization: Bank Solutions Inc. must update its security policy by defining the roles and responsibilities of individuals/groups during an event of disaster and training must be provided in order to avoid complexity. To be more precise, trainings must be performed every six months to make everyone aware of the procedures during such event.
4. Access control
Access control is also an important security and interoperability issue of the Bank Solution Inc. where there is no explanation of which users and administrators have access to control and manage information systems. This problem must be addressed immediately by defining their roles and responsibilities to protect accessibility of sensitive
…show more content…
Bank solutions Inc. clearly lacks an offsite storage for back up. It is very important to have an offsite back up storage in order to avoid operations during an event of disaster. It is highly risky to depend on a single storage site for backup storage.
Prioritization: Implementation of offsite backup storage is a must to avoid daily operational activities during an event of disaster as it provides storage of information required to carry out daily operations. As there is cost associated to maintain offsite backup storage, it is worth in order to maintain the CIA triad of system and processes.
8. Mishandling of Backup tape
Backup tapes must be stored in a safe location with dual control and this procedure is not implemented by the Bank solutions Inc. The Night Operations Manager of Bank solutions Inc. is mentioned to store the backup tapes in a safe at his home which is very unethical practice. Backup tapes are very important during disaster recovery.
Prioritization: Backup tapes play important role during disaster recovery process. This issue must be immediately addressed and proper procedure must be implemented to secure backup tapes. Upon implementation, it will be easy to record the availability of backup tapes and security issues can be reduces as well.
9. Lack of Data Center

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    It is very important to have a current and accurate data backup plan for emergency situations. Losing all of your data or maybe even just some of it could have dire consequences for the company. These consequences could be in the form of compliance infractions and come with steep fines all the way to laws suits for loosing customer data or classified information. Having the ability to restore this data if it is ever destroyed or compromised could save our company from losing all credibility and going bankrupt. Having a good data backup plan ensures that we will be able to restore our company in a disaster to an acceptable state of operation without losing much if any information necessary to keep our customers happy and business running…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The data are straightforward to backup as all the data is stored on the file server and this is significant because the work that is done might have been a lot. Therefore, it is a decisive factor. Although, purchasing the network cabling and file servers can be expensive and managing a large network is complicated, requires training and a network manager usually needs to be employed. However, for Progress Vinyl Music Stores there company would find it useful in view of that it is faster and it makes it easier. The employees would need to be trained regularly, but this is beneficial for the future considering the employees are likely to stay if the company offers support.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    C. Board approved initiation and authorization limits are in place based on job function. D. User access review performed at least annually to ensure all users have appropriate access and limits. 7. INFORMATION TECHNOLOGY RISK Information technology enables banking organizations to carry out their wire activities more efficiently and effectively, however Information Technology can also be a source of risk for the financial institution and the customer.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    e) Size of the message retrieved id 107 bytes. determined as follows:- Size (message) = number of characters in the message User is asked to send message of this size. Simulation has been done in CloudSim3.0. Shares of file have been constructed in datacenter and these shares have been sent to hosts (servers) available in that datacenter.…

    • 599 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Recovery Planning

    • 443 Words
    • 2 Pages

    With the today’s reliance on EHR’s, healthcare organizations have little tolerance for downtime and reverting to a paper based operation is no longer practical. Healthcare organizations must plan on how to recover business operations as well as the foundational IT systems and the data required to treat patients (e.g. electronic personal health information (ePHI)). Continuity, Contingency and Disaster Recovery planning are often used interchangeably when discussing recovery planning. They are critical components of emergency management and organizational resilience, but each type of planning has a very specific focus. Continuity planning exists to recover your healthcare organizations critical business functions and processes a disaster or adverse…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Business Impact Analysis Ravi Kiran Kanamarlapudi Wilmington University Diagram This Business Impact Analysis (BIA) is produced as a major aspect of the possibility arranging process for SanGrafix, a video and PC amusement configuration organization. It was set up on sixth November 2016. 1.1 Purpose The reason for the BIA is to recognize and organize framework segments by corresponding them to the mission/business prepare (es) the framework backings, and utilizing this data to portray the effect on the procedure (es) if the framework were inaccessible.…

    • 1219 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In all organisations, there are policies and procedures that control access to confidential information. Types of information that is sensitive includes personal information e.g. colleagues age, address, medical history and details of personal relationships. Sensitive data that is also available but must be kept confidential is financial information including how much they earn, also information on customers or contacts that would be highly valuable to other organisations. Businesses receive and produce a lot of information all the time and it is vital that this information is stored safely and can be found quickly. To access this, a suitable system needs to be in place to allow everyone to find the documents they need.…

    • 256 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    (see Figure 4). Furthermore, organizations should contemplate contingency strategies to provide the replacement of equipment, cost considerations, and the roles and responsibilities. Figure 4. Sample Alternate Site Criteria (Swanson et al., 2010) Develop an information system contingency plan. The information system contingency plan comprises the methods that an organization should adhere to during a disruption of its information systems.…

    • 1535 Words
    • 7 Pages
    Great Essays
  • Great Essays

    All personnel will report to one central location for accountability of staff and access cards and keys. All computers and files will be checked for any missing or copied data.…

    • 1211 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Automation could be employed to move critical files to an alternate location for safe storage. The alternate location could then be backed up to tape or some other type of long term storage media. Effective file management must include a definition of what is critical to be backed up, and what is not (Needleman, 2015). Conclusion File management is one of the most important aspects of an information technology function within a business.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Embed BCM Culture The BCM manager ensures that BCM program is embed to organization by executing various business continuity awareness sessions and trainings. Since the BCM program approached holistically, there are multiple BCM teams involved to execute the right tasks with great competence and skills. BCM teams are fully aware of the Business Continuity plan and are fully prepared for handling an incident or crisis by training and testing those teams periodically. The following exhibits the KPI of target vs achived.…

    • 1403 Words
    • 6 Pages
    Improved Essays