.

Tuesday, April 30, 2019

Incident Response, Business continuity, and Disaster Recovery Plans Research Proposal

Incident Response, Business continuity, and Disaster recuperation Plans - Research Proposal ExampleIt thus becomes imperatively necessary to provide evidence and research base guidelines for effective implementation of incident solvent and disaster recuperation plans for organizations which have employed the use of instruction and communication technology in their operations. It is due to the increasing incidents of attacks to information systems and the related security challenges that it is necessary for organizations to turn over maximum precautionary plans for response and recovery from incidences without having any signifi shagt impact on the business processes. The deficiency of effective implementation of incident response and recovery plans has been caused by lack of specific approach and strategies for administration and application of these plans within the organization. This paper presents a case study proposal with a view of enable organizations to implement effe ctive response and recovery plans for business continuity. Nonetheless, it is necessary to note that there are price and time implications which are associated with the implementation of the incident response and recovery plans for the advantage of business continuity. ... In the unaccenteded of this argument therefore, it is suitable that business organizations are guided in the proper planning of the response approaches and recovery process in cases of attacks to their information systems. The benefit of proper and organized response and recovery plan for discordant(a) attacks to organizational computer systems is the reduction of the costs and time related to failure of continuity of business processes (Haddow, wind and Coppola, 2011). All organizations require an information system policy which provides the step by step procedure for response to attacks of the system and the recovery from possible attacks (Kuonqui, 2006). Without such a policy, businesses are likely to fai l in attaining recovery from various attacks of their information systems (Jennex, 2012).Organizations often have incident response teams which help them to effectively manage various attacks to their information systems (Omar, Alijani and Mason, 2011). These teams are accredited with the role of following standard procedure for response and recovery from incidences. In this regard, the teams a significant function of protecting the organization from loss of the continuity of business processes (Kuonqui, 2006). It is notable that regardless of the postulation of information system policies as the solution to the response and recovery from incidences, there is no clear presentation of the contents of such polities. Moreover, the incident response team composition has not been defined clearly. This can be attributed to unprofessional response to attacks of organizations information systems (West, 1996). Additionally, actual steps which should be taken in the procedural response to a n incidence and recovery from such incidences have not been provided in a distinct

No comments:

Post a Comment