Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
4 Sources
Style:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 18.23
Topic:

ITM527 MOD3 SLP: Business Continuity and Disaster Recovery for Operations and Physical Security domain

Other (Not Listed) Instructions:

Module 2 - SLP
Continuous Monitoring
The following example demonstrates how to apply continuous monitoring technical reference model to a particular risk management domain. Please read the following article and identify a few key lessons learned from it in relation to what principles and methods you have learned in the case assignment.
NIST (2011). Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains.
Practicing continuous monitoring fundamentals, processes, etc. to one's own experiences offers an opportunity to apply what you've learned to the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of continuous monitoring but focus on two or three major perspectives and go much more in depth. You can choose the same security domain in the previous SLP assignment in this course, or start with a new one.
SLP Assignment Expectations
Please write a 2- to 5-page paper titled:
"Continuous Monitoring for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"
Please address the following issues:
1. Special requirements of continuous monitoring in your chosen information system security domain in your chosen organization/industry if there are any.
2. Two or three major perspectives of continuous monitoring that you choose to go in depth to discuss.
3. One or two major lessons learned from the example that you'd like to apply in your own continuous monitoring issue here.
4. Key challenges and solutions of continuous monitoring.
• Please use original writing (No Plagerism)
• Please use American URLs than can be easily verified on the web on the reference page.
• Please include the page numbers in the references
• Read then background material in the attachment titled Background
• My Organization is US Department of Defense 

Other (Not Listed) Sample Content Preview:

Business Continuity and Disaster Recovery for Operations and Physical Security domain
Name:
Institutional Affiliation:
Business Continuity and Disaster Recovery for Operations and Physical Security domain
In the US Department of Defense, physical and operations security domains are the most imperative domains in their information system. According to Craig (2012), the information system domain of physical security entails the security field, the surroundings of the information systems and its associated countermeasures of physical protection of the system. By definition, data recovery is the process of retrieving data after an occurrence of a calamity or hazard that led to losing data. Other than having a secure environment, information in the Department of Defense is vulnerable to threats from viruses, worms, and other attacks through hacking. On the other hand, business continuity entails the continuation of the normal operation of an organization after being affected by an external or internal calamity. The information system of any defense department is crucial in any nation as it houses fundamental security information, intelligence reports and other information that determine the mitigation of criminal activities that lead to a breach of peace. Losing such data will lead to difficulties in controlling the country’s peace programs and plans. DR and BC plans are important for safeguarding physical and operations security of the US DOD. Acts of terrorism may result in interruption of the department’s operations, hence the need to have DR and BC plans and management.
Requirements of DR and BC
Traditionally, DR strategies involved the duplication of paperwork and storing in places that were not prone to calamities such as fire and floods such as safe cupboards. However, as the volume of data increased, it was cumbersome to handle and store them. Therefore, one compulsory requirement is the presence of security models and architecture that is capable of storing and securing data, computer applications, and operating systems. Currently, there is a widespread adoption of cloud computing technology to be utilized in DR and BC processes (Hostway, 2010, p. 4). For a company that needs to be abreast with technology and have a secure information system, cloud computing technology is a basic requirement.
Perspectives of DR and BC
Other than operations and physical security being a domain of information system, it is also a perspective of DR and BC. It is because it is the onset of preventing the loss of data. Through the application of hazard vulnerability examination, threats to the business environment may be identified. The common threats to the physical security of any organization include sabotage, the occurrence of natural disasters, and emergencies that result in interruptions of business. Some threats that are classified as a hazard to physical security include weather elements such as heat, lack of air conditioning and ventilations, and outbreaks of fire. Other than environmental factors, physical security entails securing computer access controls through elements such as alarms, intrusion detectors, locks and security guards...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Other (Not Listed) Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!