Question

In: Civil Engineering

You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...

You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources.

You are concerned that the company has no existing contingency plans in case of a disaster.

The Board indicated that some of their basic requirements for contingency planning include:

  • A Recovery Time Objective (RTO) of 4 hours
  • A Recovery Point Objective (RPO) of 6 hours

Based on these, you now need to determine:

  • The Maximum Tolerable Downtime (MTD),
  • The Work Recovery Time (WRT) and
  • The system and data recovery priority

The Board expects that you will propose a Business Continuity Plan (BCP) for Challenger Constructions. The Board expects you to use as much of their existing resources as possible for the BCP, but understands that some additional resources may be required. Your BCP proposal must clearly state what additional resources, in terms of hardware, software and locations, are required.

Tasks:

You are to develop a proposal for a Business Continuity Plan (BCP) for Challenger Constructions in accordance with the Board's instructions above. Your proposed BCP must include:

  1. An overview of the entire BCP,
  2. A Business Impact Analysis
  3. An Incident Response Plan
  4. A Backup plan,
  5. A Disaster Recovery plan,

Solutions

Expert Solution

Answer -: first of all their must be a disaster management and backup plans to any construction company to face the accidently disasters occurs to the company beyond this if we are said to develope a BCP then there are so many point that we have to remember while preparing such a BCP.

Recovery plans -:

Although the disasters are unpredictable so we can't know the actual time of the disaster so we can't stop it but by having a pre pllaned way we can tackle the upcoming problem to 80%.

There are so many steps that we should follow to develope a recovery plan.

1) conduct an asset inventory.

A plan to recover our construction industry from a disaster is starts from the construction asset inventory .first of all start listing all the construction assets like cement storage material storage and then start mapping which asset is physically where located .

2) Perform a risk assessment.

Once we have mapped all the equipment , assets then we must go through the internal and external threats that are going to be thorough.

After that we must creat a risk management that predict the risk by imagine the worst scenario .

3) Define critically of works .

We must know that which work is critical and which is ordinary work by taking a review of money expended on them . Now after knowing that work we must pay a special attention to those works .

4) define recovery objective.

After knowing the criticallity of the works we must know the best way of recovery of our equipment by analysing the previous disasters that may occur .

5) Finding the right tools and techanics .

6) document and communicate your plan.

Now after completing the whole plan we must know the feasibility of the plan means we should know that does our plan is physically possible or not and then execution of the plan take place .

Maximum work recovery time .

The recovery time is the portion of the total recovery time frame . Calculated together by adding the WRT and RTO. This time is important for accounting because it has significant impact on the equipment which are going to be scrap and which are going to be obsolete .

Maximum Tolerable downtime.

The MTD is the total time that an organization sustain from when the outrage occurs untill normal business condition comes.

Recovery time objective of 4 hours .

Here the recovery time objective can be break up into it's components that consumes time according to their importance and uses. Now this must be enough to recover the disaster to a small level.


Related Solutions

Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A....
Imagine this is your first day as Senior Chief Information Security Officer (CISO) of Company A. The Chief Financial Officer (CFO) calls you wondering what should have been done differently during a recent incident involving your predecessor. The following incidents recently occurred and were closed out without any alert to senior staff or the CFO. The Chief Financial Officer’s admin reported that their laptops were performing erratically and many popup screens kept appearing while browsing the Internet. Upon inspection, it...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset...
During an onsite visit with the Chief Information Security Officer (CISO), he tells you how upset he is that they found Telnet in use by their network administrators. The reason was that the version of the router and switch operating system currently in use does not support security protocols. You assure the CISO that the upgrade will resolve that problem among other weaknesses he might be unaware of. you will act as the network administrator. Suggest some other network security...
Imagine you have been selected as the chief officer of UBER and have been asked to...
Imagine you have been selected as the chief officer of UBER and have been asked to conduct an initial analysis of UBER ethical culture. What ethical concerns would you raise as a priority for the company. What recommendations would you make and why? Report should not exceed 2500 words
A chief information security officer is creating a security committee involving multiple business units of a...
A chief information security officer is creating a security committee involving multiple business units of a corporation. Which of the following is the best justification to ensure collaboration across business units? A risk to business unit is a risk avoided by all business units, and liberal BYOD policies create new unexpected avenues for attackers to exploit Enterprises single point of coordination is required to ensure cyber-security issues are addressed in protected, compartmentalize groups without business unit collaboration, introduced by one...
You are the chief fiscal officer for a municipality and have been directed by the mayor's...
You are the chief fiscal officer for a municipality and have been directed by the mayor's office to lead government of a writing debt policy statement. You are aware of the risks borrowings money and the grave importance of strong internal control. what must be include in this policy if it is to be effective?
A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a...
A Chief Security Officer (CSO) has been unsuccessful in attempts to access the website for a potential partner (www.example.net). Which of the following rules is preventing the CSO from accessing the site? Blocked sites: *.nonews.com, *.rumorhasit.net, *.mars? Rule 1: deny from inside to outside source any destination any service smtp Rule 2: deny from inside to outside source any destination any service ping Rule 3: deny from inside to outside source any destination {blocked sites} service http-https Rule 4: deny...
You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form. b) One of...
You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form.
You have just been appointed to be a U.S. Foreign Service Officer (FSO), employed by the...
You have just been appointed to be a U.S. Foreign Service Officer (FSO), employed by the United States Agency for International Development (USAID). Your first assignment is working overseas in an embassy where you may give out millions of dollars in foreign aid loans to an important nation. This nation has two types of loans from the United States government. Type I loans for $2,000,000,000 and Type II loans for $34,000,000,000. Type I loans are listed by country in congressional...
You have just been appointed to be a U.S. Foreign Service Officer (FSO), employed by the...
You have just been appointed to be a U.S. Foreign Service Officer (FSO), employed by the United States Agency for International Development (USAID). Your first assignment is working overseas in an embassy where you may give out millions of dollars in foreign aid loans to an important nation. This nation has two types of loans from the United States government. Type I loans for $2,000,000,000 and Type II loans for $34,000,000,000. Type I loans are listed by country in congressional...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT