Benchmark

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

525

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

14

Uploaded by MajorMandrillPerson974

Benchmark – Business Continuity Plan (BCP) Phase 1 Lee Chauworn Houston II Brandon Bass CYB – 515 December 6, 2023 1
Table of contents Executive Overview………………………………. 3 Document Change Control ……………………………….4 Introduction and overview ……………………………….4,5 Plan Scope and Applicability……………………………….5 Plan Objectives ……………………………….5,6 Plan Assumptions ……………………………….6 Risk Assessment matrix ……………………………….6,7,8 Critical business Function overview ……………………………….8,9,10 Company Organization Chart ……………………………….11 References ……………………………….12,13 2
Executive Overview The essence of a Business Continuity Plan (BCP) lies in its ability to outline a strategic approach for maintaining operations during or after unexpected disruptions. These disruptions could range from natural calamities like hurricanes and tornadoes to targeted cyber intrusions against our establishment. The BCP serves as a roadmap, guiding us through such challenging times. This plan, thoroughly documented and integrated into our company's operational resources, identifies potential risks and delineates the procedures and standards to counteract these challenges. Its primary aim is to safeguard two crucial assets: the integrity and security of our employees and the company's operational and informational assets. These elements form the backbone of our company's reputation and investment strategy. In essence, a BCP is a blueprint for resilience, detailing vital business functions, sustaining systems and processes, and the methodologies for their maintenance during unplanned events. 3
Document Change Control Our approach to Document Change Control involves a comprehensive process starting from risk identification to recovery planning. This process includes assessing the impact of potential risks, identifying downtime and gaps, and documenting recovery workflows and procedures. Essential elements such as hardware procurement lists, relevant supporting documents, and vendor contact information are included for comprehensive coverage. This protocol extends to servers, storage devices, networks, and updates. The documentation process is meticulously structured, with a clear index or log providing an overview leading to detailed change control forms. This systematization ensures accountability and precision in managing document changes, aligning with international standards. 4
Date Version Requester Tech Change / Review 12/6/23 2.8 Lee H. Jackie R. Smart Camera Replacement Change Control Form Version 2.8 Date of Request: 12/06/2023 Change Request Initiator (name, location, phone): Lee Houston Phoenix, AZ 999-999-9888 Description of Change: We need to upgrade our existing CCTV system to advanced smart cameras with AI capabilities for enhanced security and monitoring. Reason for Change: Recently, there have been several security breaches and instances of unauthorized access in our facility. The current CCTV system is outdated and lacks features like facial recognition and motion detection, which are essential for modern security needs. How does the proposed change affect the safety vulnerabilities? (Safety, Health, and Environmental Considerations): Upgrading to smart cameras will significantly improve our ability to monitor and secure the premises. These cameras can identify unusual activities, track movements, and alert the security team in real-time, thus reducing the risk of security breaches. Resulting Changes (to existing O&M procedures, inspection and testing procedures, process/facility documents/drawings, safety plans, training requirements, etc.): 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help