Benchmark - Developing Contingency Strategies For Information System
.pdf
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
320
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
7
Uploaded by BailiffKnowledge19216
1
Benchmark
–
Developing Contingency Strategies for Information System
Adrian Andrade
Grand Canyon University
ITT-430
Timothy Montgomery
Due November 5, 2023
2
Company: Canyon Aeronautics
List of Threats
List of Threats:
-
System misconfigurations
-
Out-of-date and unpatched software
-
Missing or weak authorization credentials
List of Threats and Their Impact from Highest to Lowest
List of each Threat
Impact on Company
System Misconfigurations
High
Out-of-Date Software
High
Weak Authorization Credentials
High
List of Threats and Their Impact from Highest to Lowest + How loss of System will Impact Company
List of each Threat
Impact on Company
How the Loss of the System
will Impact the Company
System Misconfigurations
High
Losing our data or assets in our
company is very, very damaging
(depending on the asset). If the
asset is something super
confidential, then the losses will
be heavy, we would lose an
enormous amount of money,
and reputation. However, the
losses wouldn't be as severe if
the assets were of less
importance.
Out-of-Date Software
High
Weak Authorization Credentials
High
List of Threats and Their Impact from Highest to Lowest + How Loss of System will Impact
Company + Appropriate Measures to Recover from each Threat
List of each Threat
Impact on Company
How the Loss of the
System will Impact
the Company
Appropriate Measures
to Recover from each
Threat
System
Misconfigurations
High
Losing our data or
assets in our company
is very, very damaging
(depending on the
asset). If the asset is
For System
misconfigurations, the
best way to recover is
to get all employees
back on board and on
3
something super
confidential, then the
losses will be heavy, we
would lose an
enormous amount of
money, and reputation.
However, the losses
wouldn't be as severe if
the assets were of less
importance.
the way of recovering
everything. Next is to
find where the system
misconfigurations are,
and patch them.
Correctly configure
each system
configuration to ensure
that the threat can no
longer affect the
company, and the crisis
can be averted.
Out-of-Date Software
High
The best way to
recover out-of-date
software is to update
the software. The
whole issue arose from
software being out-of-
date. The next thing to
do is to configure each
device to auto-update
at a certain time of
day. This way, the
software is more likely
to be up-to-date in the
future. Of course, the
employees will need to
trained of this, and
know what to do when
the system needs to
update.
Weak Authorization
Methods
High
The best way to recover from
weak authorization credentials
is to set up a multi-step process,
and make it required to
authenticate with more than
just user credentials, like a
username or password. The
other authentication methods
could be biometrics, smart-card,
one time passwords via phone
number or email, etc.
Incident Response Plan (IRP)
In this plan, we will describe the steps to take when a cyber incident occurs (due to one of our threats
being exploited, such as weak credentials, or system misconfigurations). This plan will outline the roles
and responsibilities of the security organization, going from users to CISO and our reporting guidelines.
More so, this plan will articulate activities to mitigate possible or real time threats (key examples are
system monitoring and incidence response).
Alongside that, this plan will display workflow diagrams and event to resolution, explanation of the six
stages of incident handling related to the company, escalation procedures, with an associated chart, a
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help