We have sequentially integrated the concepts of security, risk management, and privacy in the computing environment. For this assignment, you will design a corporate risk-management plan for FSB as part of the corporate security program. The format for the plan will be as follows:
Introduction – State of the Organization
The current state of corporate management of systems and applications and the threats every organization or institution faces in the era of mobile and cloud computing as the new normal for transaction processing.
Organizational Chart
Network Diagram
Objectives of the Risk-Management Plan – Risk Statement
Definition of IT emergencies, ranking the nature of incidents—whether they are natural, technical, human resources, or cyber-threats.
Business Impact Analysis (BIA) for FSB
Plan of Action and Milestones (POAM) – Action Plan for Incident Response and Risk Management
Strategies to assess and mitigate risk and maintain privacy when cloud computing is used in a production environment.
Disaster Recovery Sites – Remote Locations
IP lines redirect to a different location inside the organization (cold site).
Temporary IT center contracted for the purposes of partial recovery of business functions (hot site).
Inventory
Hardware and network architecture, databases, and applications—classified in criticality levels.
Backup Strategy
Documents protection and electronic files replication.
Transfer Strategy
Steps to follow to transfer operations to a remote location.
Testing Plan
A plan for implementing drills, including frequency and results reporting.
Plan Distribution
User Awareness and Training of Emergency Committee Personnel
100% Plagiarism Free Paper | All Rubrics Are Reported