We're Open
+44 7340 9595 39
+44 20 3239 6980

Contingency Project

  100% Pass and No Plagiarism Guaranteed

Contingency Project

Contingency Project

INSTRUCTIONS:
The security officer has just tested the disaster recovery plan with horrible results; systems that were taken off-line will not come up, data have corrupted the databases, and access to the network from the outside is terminated. What started as a 4-hour project is now approaching 18 hours. What do you do? • Develop a contingency project. o What do you do? o Who do you contact? o What escalation procedure will you follow? o How will you address this failure to management?
CONTENT:
CONTINGENCY PROJECT(Insert Name)(Institutional Affiliation) OverviewThe successful response to a disaster should be able to address the following factors:To minimize the extent and number of the security incidentBring together the response teamDevelop an incident response planContain the damage and minimize the risks associated with itThe contingent plan adopted for this scenario will be follows:Assessment This is the initial stage of the plan and involves the definition of the main objectives of the plan, the departments or individuals to be involved and their responsibilities. This is achieved by developing a formal policy statement and guidance which will be necessary to develop an effective contingency plan (Resnburg, 2011).AnalysisThe business impact analysis needs to be conducted to prioritize the systems that are important in supporting the functions of the organization. This way, an identification of the critical systems and functions that the business heavily relies on are identified. The length of time that the business can operate without such services and systems is then estimated. The business impact assessment report should be sent to the relevant steering committee and hence the time limits within which these services and processes should be recovered are clearly determined.Requirements definitionThe recovery requirements should be developed. The resources needed to support the most vital organs of the institution are identified should be identified. This will involve the profiling of major hardware like the personal computers and the voicemail communications. This will enable restore communication (Microsoft Technet, 2011). In addition, the necessary software available must be documented, facilities like the working spaces and the personnel for each unit must be determined. For this instance, the public network system must be analyzed to restore communication. Development of the recovery planThe necessary recovery plans and components need to be documented to aid this proces...

100% Plagiarism Free & Custom Written,
Tailored to your instructions


International House, 12 Constance Street, London, United Kingdom,
E16 2DQ

UK Registered Company # 11483120


100% Pass Guarantee

STILL NOT CONVINCED?

View our samples written by our professional writers to let you comprehend how your work is going to look like. We have categorised this into 3 categories with a few different subject domains

View Our Samples

We offer a £ 2999

If your assignment is plagiarised, we will give you £ 2999 in compensation

Recent Updates

Details

  • Title: Contingency Project
  • Price: £ 99
  • Post Date: 2021-09-27T07:15:11+00:00
  • Category: Essays
  • No Plagiarism Guarantee
  • 100% Custom Written

Customer Reviews

Contingency Project Contingency Project
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

The rates are a bit expensive for me of the essay writing service but the overall look is amazing. The references and formatting are done beautifully. So, I feel that the high rates are worth all these qualities. I want to thank you for great help.
Reviews: 5

A masterpiece of assignment by , written on 2020-03-12

I ordered the literature review for my research project in rush delivery. I was not expecting that they would complete my order 2 hours before my chosen time. The quality is also nice. Thank you for help.