Access over 35 million academic & study documents

Business Continuity Plan For Communications Systems 2

Content type
User Generated
Subject
Computer Science
School
UMGC
Type
Homework
Rating
Showing Page:
1/8
Running head:Business Continuity Plan for Communications Systems 1
Business Continuity Plan for Communications Systems
Name
Institutional Affiliation
Course
Date of Submission

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/8
Business Continuity Plan for Communications Systems 2
Introduction
In contemporary society, communication through computers systems is key for business
progression. However, with communication over networks, the message interchange is
vulnerable to external attacks such as eavesdropping, identity spoofing, sniffing, or even denial
of service (DDoS) attacks. With their threats, organizations have to put in place prevention
measures in the network such as firewalls, to ensure the communication channels are well
protected. However, in case of a successful attack, the business is expected to experience a slow
down in operations, and in some cases huge losses. Therefore, comprehensive recovery measures
need to be put in place so as to ascertain successful and timely recovery from a network attack.
According to (Virginia & Michael, 2004), this obliges the need for a Business Continuity Plan
(BCP) which essentially is a set of procedures and predetermined processes that are used to
restore a network’s operability in the most optimal manner after an attack. This provision will
outline a detailed BCP drafting a recovery plan from ransomware attacks, and an incident
response plan with consideration to different aspects of operating systems and network topology
of current communication systems.
Software Development Life Cycle (earlier steps)
Operating Procedures
A network system centered on communication should implement a number of quality
engineering security practices. First, a user should be offered a number of utilities and
applications by the operating system to facilitate the management of information over a network.
With regards to data storage, a user should be able to clean, defragment, or format disk storage,
and this facilitates easy administration of data in a single workstation environment. Moreover, a
user can backup information to ensure that in case of an erroneous operation, they can restore the

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/8

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 8 pages?
Access Now
Unformatted Attachment Preview
Running head:Business Continuity Plan for Communications Systems Business Continuity Plan for Communications Systems Name Institutional Affiliation Course Date of Submission 1 Business Continuity Plan for Communications Systems 2 Introduction In contemporary society, communication through computers systems is key for business progression. However, with communication over networks, the message interchange is vulnerable to external attacks such as eavesdropping, identity spoofing, sniffing, or even denial of service (DDoS) attacks. With their threats, organizations have to put in place prevention measures in the network such as firewalls, to ensure the communication channels are well protected. However, in case of a successful attack, the business is expected to experience a slow down in operations, and in some cases huge losses. Therefore, comprehensive recovery measures need to be put in place so as to ascertain successful and timely recovery from a network attack. According to (Virginia & Michael, 2004), this obliges the need for a Business Continuity Plan (BCP) which essentially is a set of procedures and predetermined processes that are used to restore a network’s operability in the most optimal manner after an attack. This provision will outline a detailed BCP drafting a recovery plan from ransomware attacks, and an incident response plan with consideration to different aspects of operating systems and network topology of current communication systems. Software De ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents