Benchmark - Developing Contingency Strategies For Information System

.pdf

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

320

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

7

Uploaded by BailiffKnowledge19216

Report
1 Benchmark Developing Contingency Strategies for Information System Adrian Andrade Grand Canyon University ITT-430 Timothy Montgomery Due November 5, 2023
2 Company: Canyon Aeronautics List of Threats List of Threats: - System misconfigurations - Out-of-date and unpatched software - Missing or weak authorization credentials List of Threats and Their Impact from Highest to Lowest List of each Threat Impact on Company System Misconfigurations High Out-of-Date Software High Weak Authorization Credentials High List of Threats and Their Impact from Highest to Lowest + How loss of System will Impact Company List of each Threat Impact on Company How the Loss of the System will Impact the Company System Misconfigurations High Losing our data or assets in our company is very, very damaging (depending on the asset). If the asset is something super confidential, then the losses will be heavy, we would lose an enormous amount of money, and reputation. However, the losses wouldn't be as severe if the assets were of less importance. Out-of-Date Software High Weak Authorization Credentials High List of Threats and Their Impact from Highest to Lowest + How Loss of System will Impact Company + Appropriate Measures to Recover from each Threat List of each Threat Impact on Company How the Loss of the System will Impact the Company Appropriate Measures to Recover from each Threat System Misconfigurations High Losing our data or assets in our company is very, very damaging (depending on the asset). If the asset is For System misconfigurations, the best way to recover is to get all employees back on board and on
3 something super confidential, then the losses will be heavy, we would lose an enormous amount of money, and reputation. However, the losses wouldn't be as severe if the assets were of less importance. the way of recovering everything. Next is to find where the system misconfigurations are, and patch them. Correctly configure each system configuration to ensure that the threat can no longer affect the company, and the crisis can be averted. Out-of-Date Software High The best way to recover out-of-date software is to update the software. The whole issue arose from software being out-of- date. The next thing to do is to configure each device to auto-update at a certain time of day. This way, the software is more likely to be up-to-date in the future. Of course, the employees will need to trained of this, and know what to do when the system needs to update. Weak Authorization Methods High The best way to recover from weak authorization credentials is to set up a multi-step process, and make it required to authenticate with more than just user credentials, like a username or password. The other authentication methods could be biometrics, smart-card, one time passwords via phone number or email, etc. Incident Response Plan (IRP) In this plan, we will describe the steps to take when a cyber incident occurs (due to one of our threats being exploited, such as weak credentials, or system misconfigurations). This plan will outline the roles and responsibilities of the security organization, going from users to CISO and our reporting guidelines. More so, this plan will articulate activities to mitigate possible or real time threats (key examples are system monitoring and incidence response). Alongside that, this plan will display workflow diagrams and event to resolution, explanation of the six stages of incident handling related to the company, escalation procedures, with an associated chart, a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help