The Importance Of Designing A Security Plan

Improved Essays
Disaster plans are a very important part of designing a security plan. Disasters come in several types. There are physical disasters like earthquakes, tornados, hurricanes, and floods. Then you have non-physical such as data breaches and system failures. In order for us to complete our security plan we need to create a disaster plan to help us should an unfortunate event occur. The first step in creating a disaster plan is to conduct a business impact analysis (BIA). To conduct a BIA, we must first start by figuring out all the systems and applications we use and where each of them reside.(searchhealthit.techtarget.com) Then once we know what we have we take that information and then determine each one impact to the company should it go down and since we are a healthcare organization we have to include …show more content…
Then next we need to look at what vulnerabilities affect each one and come up with a plan to fix those vulnerabilities and implement that plan. (searchhealthit.techtarget.com) The next step is to look into backup programs and think about how and where we will store those backups. There are many programs available and the way I would work backups is to use a combination of disk-based backup and tape backups. You may be thinking why would we use two and two will be expensive. So, I will explain my reasoning behind this route. The tape backup is not enough on its own. The tape backups are one time backups so if you perform a backup at 10 you have 23 hours before another backup will occur. Should a disaster occur during that 23 hours everything new added after the 10pm backup will be lost.(searchhealthit.techtarget.com) Disk-based backups are continuous backups meaning they are always backing up all the new data. The

Related Documents

  • Improved Essays

    Nt1310 Unit 4 Test Paper

    • 419 Words
    • 2 Pages

    Its implementation involves the loss of an entire disks storage space. 2. Can survive failure of only ONE drive but this failure would slow down performance due to data recreation. 3. Once one disk fails, a new disk will require data recreation from the compressed parity data and would take longer.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Paper

    • 985 Words
    • 4 Pages

    Recommended Kernel Custom kernel can be fantastic for organizations that need to utilize only one or minimum services and applications for their organization. Open source codes of Linux distributions make it possible for Linux administrators to configure kernels for exactly what the company needs. The downside to this is that you would have to employee a Linux administrator adequate enough to configure and update Linux for the company full time.…

    • 985 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Christopher, I enjoyed reading your thread, it brings back memories of when I first got started in information technology. I remember seating in class and having to build a computer from ground up, loading the 13 1.68 Mb DMF floppy disk for windows 95; that made a it a two day process. LTO tapes is probably the cheapest and fairly reliable tape backup nowadays, but organizations that are required to keep records for multiple years or medium to large organizations may want to look at other solutions. The current most reliable backup solution is hard disk, SATA, Solid State or Flash drives storage arrays. One of the leading solutions is EMC AVAMAR or Data Domain; both of these solutions can be replicated to another alike device at a DR…

    • 130 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    INFO 290: Final Exam

    • 1200 Words
    • 5 Pages

    Disasters cannot always be avoided. However with creating recovery plans the outcomes of a disaster can be minimized. A Disaster recovery plan lowers the downtime and potential data loss for businesses and individuals that have them. First it protects the organization if computer services become unusable. Additionally, the plan minimizes the disturbances of the business and gives some level of stability and an order after or during a disaster.…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It includes the collection and analysis of intelligence and information, as well as the development of policies, plans, procedures, mutual aid and assistance agreements, strategies, and other arrangements to perform missions and tasks. Planning also improves effectiveness by clearly defining required capabilities, shortening the time required to gain control of an incident, and facilitating the rapid exchange of information about a situation. Governments at all levels have a responsibility to develop detailed, robust, allhazards response plans. These plans should have clearly defined leadership roles and responsibilities, and they should clearly articulate the decisions that need to be made, who will make them, and when. These plans should include both hazard-specific as well as comprehensive all-hazards plans that are tailored to each respective jurisdiction.…

    • 5564 Words
    • 23 Pages
    Improved Essays
  • Improved Essays

    Recovery Planning

    • 443 Words
    • 2 Pages

    With the today’s reliance on EHR’s, healthcare organizations have little tolerance for downtime and reverting to a paper based operation is no longer practical. Healthcare organizations must plan on how to recover business operations as well as the foundational IT systems and the data required to treat patients (e.g. electronic personal health information (ePHI)). Continuity, Contingency and Disaster Recovery planning are often used interchangeably when discussing recovery planning. They are critical components of emergency management and organizational resilience, but each type of planning has a very specific focus. Continuity planning exists to recover your healthcare organizations critical business functions and processes a disaster or adverse…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Emergency Plan Nvq

    • 231 Words
    • 1 Pages

    • An emergency plan is a written set of instructions that outlines what workers and others at the workplace should do in an emergency. The types of emergencies to plan for may include explosion, fire, medical emergency, rescues, incidents with hazardous bomb threats, chemicals, armed confrontations and natural disasters. To reduce the danger of illness spreading throughout your office: - put clear policies in place regarding personal hygiene and cleanliness in the workplace, including properly washing hands; - keep all areas of the office clean; - ensure the fridge and kitchen cupboards are cleaned out frequently and dispose of any items that have passed their used-by date; - disinfect shared work items between uses; - send home any worker…

    • 231 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Security Domains and Strategist Multi-Layered Security Plan An Actionable Plan A sound security plan is the first step towards a multi-layered defense. To develop a plan, the company must assess its most important assets, identify vulnerabilities as well as the infrastructure and technology most appropriate for mitigating risk, then implement a strategy for putting the plan into action. Email is a prime example.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    The operating system offers the ability to keep different versions of system and files. An individual is not limited to the built-in features of Windows backup. Information may be copied to alternate locations as a backup mechanism, such as an external drive. Redundant storage is an effective means of backing up files.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Essay On 1980 Heat Waves

    • 2096 Words
    • 9 Pages

    The 1980 Heat Wave in the United States Disasters, as the word suggests, is a phenomenon that actually tends to spell a doom on the regular routine of an entire society and depending upon its size and effects it can even cause a change in the working process of an entire country. Basically, when something big happens that we cannot stop or cannot change is known as a disaster. Every year, millions of people are affected by the natural disasters and man-made disasters (Georgian Med News, 2011). In this paper, we will discuss about a natural disaster that took place in the United States and the studies in Disasters preparedness.…

    • 2096 Words
    • 9 Pages
    Superior Essays