Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Contingency Planning Layers In an organization like International Produce, which

ID: 3914352 • Letter: C

Question

Contingency Planning Layers In an organization like International Produce, which was the focus of the unit assignment, having an incident involving highly valuable corporate data for which the organization was completely unprepared to handle is generally the catalyst to making incident response and contingency planning rise to the top of the list of things to do. The complexity of the organization and the large number of locations and stakeholders make enterprise-level planning difficult to tackle. Use the study materials and any research needed to fill in knowledge gaps and discuss the following topics: What roles should be included in a project team to look at the development of enterprise-level incident response and contingency planning procedures? How does the IT team integrate IT-specific planning with the overall enterprise effort? From an information security perspective, what role would information security staff play in ensuring that all of these plans adequately address the security implications? Response Guidelines Read the posts of your peers and respond to at least two. Expand on the concepts covered in their initial posts. The quantity and quality of your posts will determine the value of the group's learning experience. Provide a substantive and appropriate response.

Explanation / Answer

In many organisation in the world there is no proper security during the cyber attacks and the security attacks continue to be challenge with their organisation experience. There are around 85 cyber attacks are going on every year in our world. So an average of each bank sector are in addition to the malware and penetration attacks received each day in a year.

So the focus organisation shouldn't be on the hyperbole but how to make sure that operational management and security team can handle them.

The security team can and should handle the issue as a bank or business priority and hire continuously trained people in building cyber-resilient businesses.

So security teams can detected a high number of each company's attacks and 99% of people said they learned about the remainder of the attacks from their own employees.


Even all the IT teams at organisation have customer data and limited credit card fraud which has been protected by the security. but the security of most organisation are internal security system so there is still a need of securing is required.

There are some ideas on improving the network security in the IT organisation as follows below:

- Adopting the mindset of the IT team to prioritize the most business critical parts.

- The network and use network segmentation to achieve the creation of network zones and limits the ability for a hacker to move laterally across a compromised network.

- Network segmentation requires continual updates and configurations in servers and systems in organisation for better security and they must maintain the difference between a hacker and employees for troubling the computer and helping themselves to the organisation ATM systems.

- Better to Implement an enterprise wide security policy to serve as a crucial road map for any bank IT team to maintain the security architecture.

- We should protect the organisation systems and findout the best way for the network to operate with minimal risk.

- The security policy should always take the consideration for all the regulatory and enterprise compliance which are require and how to apply timely patches to maintain compliance in the business.

- There should be a good Security policy enforcement. So that the security policy can defines how the IT platform behaves and validate that it is being enforced across our network.

- Doing the minimal amount of security precautions and security steps with some regulations wont make our network safer. So the Organizations must monitor their network for changes to configurations and ensure the changes are approved and compliant with the policy maintained.


- Bank robbers are not committing physical acts in present days. There is a new generation of cybercriminals has been intimated the knowledge of banking systems and inner workings which are using the vulnerabilities to their advantage.

- So While managing the network security it can be a complex, resource intensive task, it is a crucial part for all the senior management and they cant have an accurate picture of the security posture at all times and they cant have the ability to act quickly to close the gaps in the business.


The strategies that are available to database administrators that would prevent security breaches and the laws, rules, and standards that may be applicable to a company and this possible security breach are:

- Always Change the default passwords for the default users.

- And Do not reuse the same passwords.

- when ever an employee is in leave Always disable the user accounts.

- Always track the logs in the server or systems and examine all kind of security logs in servers.

- Always do the regular network scans in the server or system.

- Always monitor the outbound network traffic in order to avoid the Malware detection.

- Always patch the systems and updates which are available and Keep the operating system and application software up to date.

- Always have plan for security precautions and implement the security plan.

- In between the clients and vendors raise user awareness about the security info.

- And have the management support to implement the security plan.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote