Sign In
Not register? Register Now!
Pages:
6 pages/β‰ˆ1650 words
Sources:
2 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 38.88
Topic:

Information System Contingency Plan

Coursework Instructions:

Prior to beginning work on this assignment, read Chapters 1 to 5 of Contingency Planning Guide for Federal Information Systems (Links to an external site.).
Mr. Martin, your esteemed CISO, wants EZTechMovie to be able to recover quickly should some hazard occur. To ensure EZTechMovie is resilient if a hazardous event occurs, Mr. Martin would like you to create either a cyber incident response plan or an information system contingency plan, which will be based upon the critical business function (CBF) that you identified in Week 1. Templates from Appendix A in the Contingency Planning Guide for Federal Information Systems (Links to an external site.) have been created for you to review. Please select the appropriate template based on the CBF selected in Week 1:
Information System Contingency Plan Template: Low Impact Download Information System Contingency Plan Template: Low Impact
Information System Contingency Plan Template: Medium Impact Download Information System Contingency Plan Template: Medium Impact
Information System Contingency Plan Template: High Impact Download Information System Contingency Plan Template: High Impact
After reviewing the appropriate template, you will be writing a three- to five-page paper on completing the information system contingency plan and what you would need to incorporate into the plan.
In your paper,
Incorporate the information from the appropriate Information System Contingency Plan Template based upon the CBF that you identified in Week 1.
Identify personnel to be notified in the event of a crisis.
Elaborate the process of personnel notification in a situation where cell towers and other telecommunications may be unavailable.
Be as specific as possible about notifying personnel in the event of a crisis. Include how you would notify them.
The Information System Contingency Plan paper
Must be three to five double-spaced pages in length (not including title and references pages) and formatted according to APA Style (Links to an external site.) as outlined in the Writing Center’s APA Formatting for Microsoft Word (Links to an external site.)resource.
Must include a separate title page with the following:
Title of paper in bold font
Space should be between title and the rest of the information on the title page.
Student’s name
Name of institution (UAGC)
Course name and number
Instructor’s name
Due date
Must utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.
Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
For assistance on writing Introductions & Conclusions (Links to an external site.) as well as Writing a Thesis Statement (Links to an external site.), refer to the Writing Center resources.
Must use at least two scholarly, peer-reviewed, or credible sources in addition to the course text.
The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for this assignment.
To assist you in completing the research required for this assignment, view this Quick and Easy Library Research (Links to an external site.) tutorial, which introduces the UAGC Library and the research process, and provides some library search tips.
Must document any information used from sources in APA Style as outlined in the Writing Center’s APA: Citing Within Your Paper (Links to an external site.) guide.
Must include a separate references page that is formatted according to APA Style as outlined in the Writing Center. See the APA: Formatting Your References List (Links to an external site.) resource in the Writing Center for specifications.

Coursework Sample Content Preview:

Information System Contingency Plan
Student’s name
Name of institutions (UAGC)
Course name and number
Instructor’s name
Due data
Information System Contingency Plan
For EZTechMovie to recover quickly, should a hazardous event occur, it is critical to prepare either a cyber incident response plan or an information system contingency plan (ISCP) based upon the identified critical business function (CBF) that is unique to the business. In processing card payments, users or customers are protected from unauthorized data access from third parties, making the User domain one of the important CBFs that require careful information contingency planning. CBFs are business processes and activities that must be restored should any event of disruption occur to ensure the protection of the business or organization’s assets. Apart from returning the business to normalcy, restoring CBFs aims to satisfy business regulations and meet organizational needs. Effective restoration of CBF requires contingency planning to ensure that an organization is capable of withstanding disasters or security breaches. Before such hazards happen, it is necessary to carry out business continuity management (BCM) and planning, business impact analysis (BIA), and disaster recovery planning to ensure an organization is protected and capable of responding to common security breaches or disasters (Swanson et al., 2010). Paunescu and Argatu (2020) have found that business continuity response has the strongest impact on the effectiveness of any organization’s BCM. The appropriate personnel should be notified in the event of a crisis, and the process of personal notification in a situation where cell towers and other telecommunication services may be unavailable needs to be elaborated. Based on the ISCP template (medium impact), this paper describes the information system contingency plan and what will need to be incorporated into the plan as well as the right personnel to notify should any hazard arise in the EZTechMovie business.
The National Institute of Standards and Technology (NIST) has provided three templates to address security controls for different FIPS 199 impact levels as specified by NIST SP 800-53. For “Moderate” security categorization, NIST specifies concepts of operation, activation and notification, recovery procedures, and reconstitution should an attack happen to EZTechMovie (Swanson et al., 2010). The contingency plan needs to include accurate information on the application, hardware and software specifications, and the telecommunication components of the application. In the case of EZTechMovie, the card payment application that stores users’ data should be described in a statement following the agency’s policies for contingency planning. The ISCP consists of the introduction, concept of operations, activation and notification, recovery, reconstitution, and the appendices. The introduction section contains the background or information about the need for ISCP in recovering systems following a service disruption. This section also consists of the scope of the ISCP; in this case, it is a moderate-impact system as specified through the Federal Information Processing Standards (FIPS) 199. Thi...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!