Access Millions of academic & study documents

Wk8 Business Continuity Plan

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/7
Running head: BUSINESS CONTINUITY PLAN 1
Business Continuity Plan
Student Name Here
Strayer University
Dr. Richard Brown
April 15, 2014

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
BUSINESS CONTINUITY PLAN
2
Business Continuity Plan
Introduction
Businesses are faced with a lot of risks ranging from natural disasters to security threats
by hackers. This has made business continuity plan important for all businesses to show the
contingency plan in case of attack (Bompard et al., 2013). For the information technology
industry, the business continuity plan addresses the measures taken in case of exposure to both
the internal and external threats. This continuity plan will display the measures put in place by
Idaho print shop.
Exposure to Internal and External Threats
The print shop uses satellite communication that has been shown to have several
vulnerabilities and flaws. The use of the Internet as the main channel for communication also
places the shop at risk of threats and breaches.
Internal Threats
Employees privileged access. The privileged access to sensitive data of the company can
be manipulated to pose a security threat to the company. The employees are the major channel
for this kind of threat (Bompard et al., 2013). The fact that all sensitive information is
transmitted through email makes the shop more threatened by the attacks.
Social engineering. The shop uses passwords to access the system files as well as log to
the computers. If the employees get attacked by a phishing email, it is most likely that they will
open it. This may lead to a breach of the security as the passwords can be exposed to hackers.
Malicious download over the Internet. The print shop employees may use the Internet
for personal use, and this may lead to the download of malicious content. The contents may
make it easier for the attackers to access the sensitive files (Bompard et al., 2013).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
Running head: BUSINESS CONTINUITY PLAN Business Continuity Plan Student Name Here Strayer University Dr. Richard Brown April 15, 2014 1 BUSINESS CONTINUITY PLAN 2 Business Continuity Plan Introduction Businesses are faced with a lot of risks ranging from natural disasters to security threats by hackers. This has made business continuity plan important for all businesses to show the contingency plan in case of attack (Bompard et al., 2013). For the information technology industry, the business continuity plan addresses the measures taken in case of exposure to both the internal and external threats. This continuity plan will display the measures put in place by Idaho print shop. Exposure to Internal and External Threats The print shop uses satellite communication that has been shown to have several vulnerabilities and flaws. The use of the Internet as the main channel for communication also places the shop at risk of threats and breaches. Internal Threats Employees privileged access. The privileged access to sensitive data of the company can be manipulated to pose a security threat to the company. The employees are the major channel for this kind of threat (Bompard et al., 2013). The fact that all sensitive information is transmitted through email makes the shop more threatened by the attacks. Social engineering. The shop uses passwords to access the system files as well as log to the computers. If the employees get attacked by a phishing email, it is most likely that th ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Documents