Justification Of Disaster Response Protocols

Great Essays
Statements of Policy
The purpose of this statement of policy is to establish incident response protocols, disaster response protocols and methods for maintaining information assurance. This will outline procedures that are in accordance with legal and organizational regulation requirements and policies that will address any issues regarding information stored within the organization.

Incident Response Protocols
Unauthorized Facility Access:
If there is an unauthorized attempt to access the facility where the data files are kept the MPs will be notified immediately.
All personnel will report to one central location for accountability of staff and access cards and keys.
All computers and files will be checked for any missing or copied data.
…show more content…
Fire department will be notified immediately.
The IT Officer will notify the IT office to do a quick back up of the facilities data servers in case of total loss.
All data equipment and files will be checked after fire is put out to determine loss.

Sprinkler Activation
The company IT Officer on duty or on call will be notified upon activation.
Once the source of activation is identified or eliminated. We will shut off the system and conduct a thorough analysis of all data systems and files.
The IT Officer will notify the IT office to do a quick back up of the facilities data servers in case of total loss.

Justification of Disaster Response Protocols
These protocols are emplaced to ensure that even in a disaster data is safe and recoverable. If there is a need to replace the network equipment the data has been secured at an offsite location for data restore. The company IT Officer is the point man to ensure the IT office is aware of the situation and take steps outlined in documented procedures.

Access Control Protocols
IT Office
Personnel in the IT Office has Super User permissions to log into any system on the network.
They require for
…show more content…
The review of policies and procedures are to ensure that they are up to date with the latest assurance plan. The policies and procedures are what governs how data is handled.
Security training briefs are administered to new comers and old employees. The briefs are to educate the users on how to handle the information they come across on a daily basis. The quarterly is just to ensure the user is still aware of the current information assurance plan and update them on any changes.
Testing security implementations like logins and password, and permission schedules and tables ensures that all security measures are working as configured.
Ensuring old logins are removed from the system ensure not only system integrity but information integrity as well. Old logins can be used if found to access the network and any information stored.
Logins and passwords are like house keys. Give the wrong person the right keys and they can walk up in your house with no issue. The logins have to have the correct permissions to access information because if you give someone too high of a permission they may access information that they were not supposed to

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Each employee should be held responsible for ensuring that their daily backup has taken place without any errors. If errors should arise, an IT Professional such as myself should be notified…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    2.4.11 Independent testing: KIU should have a testing plan that identifies control objectives; schedules tests of the controls used to meet those objectives; ensures prompt corrective action where deficiencies are identified; and provides independent assurance for compliance with security policies. Security tests are necessary to identify control deficiencies. An effective testing plan identifies the key controls, then tests those controls at a frequency based on the risk that the control is not functioning. Security testing should include independent tests conducted by personnel without direct responsibility for security administration. Adverse test results indicate a control is not functioning and cannot be relied upon.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Employees are responsible for maintaining the information that may reside on various storage platforms utilized at the university, to include emails, databases, text files, pdf files, computer usage logs, and other…

    • 1033 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    Sub section 9.1.02.01 – Warning Banners Current Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers,desktops, VPN connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    There is panel control where a unit/equip is available in front of their cameras and other apparels to diagnose and give disposable information about the concern. Most often, this kind of security is to ensure that sensitive areas can only be accessed by authorized persons only, they control the equipment, data, electronic information of the organization from breaching or any other violence. D.B Parker proposed three additional elements for Information Security: Firstly, we have authenticity which accounts on the veracity of the information stored by the control or the website manager. It ensure that the members registered in the organization are who they state to be. We have possession and control, this is the control of the documents and all information saved in a computer or on a chip with encrypted code or information.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The security policies should outline what employees are expected of in regards to complying with the security policies and the consequences…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As our continuing commitment to quality, our organisation is set up of policies and procedures. The policies and procedures are include the national guides and regulations which is set by Department of Health, CQC, Local Authorities, Health and Safety and our internal policies. We are all agreed to work according to the policy and…

    • 715 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    1.1: The role of policies is to set out rules and directives in order to help staff in the setting to achieve their aims and objectives and are primarily there to assist them in making the right decisions. Policies will usually outline the requirements of what is necessary for staff to be aware of and what to abide by. They are also in keeping with the law and are set up in a way for both outside professional agencies and staff within the environment. They may also be there for parents to refer in order to keep themselves aware of the schools beliefs and values. Procedures on the other hand are the way these policies are carried out and they provide the staff with a guide of instructions based on how to go about their duties and be able to overcome certain issues.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It is acknowledged that disasters are unique occurrences, which require specific resources dependent upon the type, nature, and extent of the emergency. In this regard, this document is not all-inclusive, nor does it limit or restrict reasonable or prudent actions. Much of the information that is needed to implement a plan like this one should be treated as sensitive. The exact locations of shelters and rallying points, the routes to be taken during an evacuation, the location of a command post to centralize information and decision-making and the means of communication may be useful information to potential terrorists or other criminals.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Question: Question 12 Answer: Staff Policies and procedures are there to ensure staffâ€TMs health and welfare are protected and that there rights are supported. Some policies…

    • 613 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Phoenix IT Group Case Study

    • 2742 Words
    • 11 Pages

    Risk and challenges associated with data security Pheonix’s flagship service delivered through Partner BU to the end users includes desk-side support and break/ fix assistance. These service requires engineers to be located at the client side or in remote locations and respond to end user IT issues. These can range in the scope but in general include software & hardware support and act as a response to the issue raised through the call centre. As a result of delivering this type of service, Phoenix is constantly accessing customers’ data and also faces challenges that were described in the previous section.…

    • 2742 Words
    • 11 Pages
    Superior Essays