1. Using a Web search engine, search for the terms disaster recovery and business continuity. How many responses do you get for each term? Note the names of some of the companies in the response. Now perform the search again, adding the name of your metropolitan area or community.
answer:
A web search for the term "disaster recovery" yields approximately 1.1 billion results. Companies prominently mentioned in these results include IBM, Microsoft, and Dell, among others. The search for "business continuity" returns about 443 million results, with companies like PwC, Cisco, and Smartsheet frequently appearing.
When narrowing the search by adding "San Francisco" to each term, the results adjust accordingly. For "disaster recovery San Francisco," the search brings up more localized results, including companies such as Bay Area IT Solutions and local government resources. For "business continuity San Francisco," local consultancy firms like Continuity Central and regional offices of larger firms like PwC are highlighted.
These localized searches provide more relevant results for individuals or businesses looking for services and solutions specific to their geographic area.
2. Go to http://csrc.nist.gov. Under “Publications,” select Special Publications, and then locate SP 800-34, Rev. 1, “Contingency Planning Guide for Federal Information Systems.” Download and review this document. Outline and summarize the key points for an in-class discussion.
answer:
Key Points of NIST SP 800-34, Rev. 1: Contingency Planning Guide for Federal Information Systems
1. Purpose and Scope:
Provides guidelines for federal organizations to develop, implement, and maintain effective contingency plans.
Ensures systems are resilient and can recover from disruptions.
2. Contingency Planning Process:
Develop a structured plan including a Business Impact Analysis (BIA) to identify critical functions.
Establish recovery priorities and strategies.
3. Plan Structure:
Activation/Notification: Steps for initial response.
Recovery: Procedures to restore system operations.
Reconstitution: Actions to return to normal operations.
4. Types of Plans:
Includes COOP, DRP, and IRP.
5. Maintenance and Testing:
· Regular updates and tests to ensure plan effectiveness.
3. Use your library or the Web to find a reported natural disaster that occurred at least six months ago. From the news accounts, determine whether local or national officials had prepared disaster plans and if the plans were used. See if you can determine how the plans helped officials improve disaster response. How do the plans help the recovery?
answer:
In September 2022, Management (FDEM), had prepared disaster plans that were actively implemented during the crisis.
Prepared Plans and Utilization:
Local and State Plans:
Governor Ron DeSantis activated the Florida Small Business Emergency Bridge Loan Program, providing $50 million to support small businesses (Home).
The Florida Division of Emergency Management coordinated local response efforts, including evacuation orders and resource distribution (Home).
National Response:
FEMA provided substantial support, including $771 million in grants for individuals and $358 million for emergency state response (Home).
FEMA's Disaster Survivor Assistance teams conducted door-to-door outreach to ensure residents received aid quickly (Home) (SBP).
Impact on Response and Recovery:
Improved Response:
The prepared plans allowed for a swift and organized response, minimizing delays in aid distribution and resource allocation.
The establishment of Disaster Recovery Centers facilitated immediate community support and services (Home) (SBP).
Aiding Recovery:
The structured approach helped in providing financial support for housing repairs and business recovery, essential for long-term recovery efforts.
Coordination with non-profits like SBP ensured resources were directed to the most vulnerable communities, enhancing overall recovery effectiveness (SBP).
Hurricane Ian impacted Florida, causing significant damage. Local and national officials, including FEMA and the Florida Division of Emergency
4. Using the format provided in the text, design an incident response plan for your home computer. Include actions to be taken if each of the following events occur:
answer:
a. Virus attack
Install and regularly update antivirus software.
Enable real-time scanning and automatic updates.
b. Power failure
Use an Uninterruptible Power Supply (UPS) for critical devices.
Regularly save important work and create backups.
c. Fire
Store backups in a fireproof safe or cloud storage.
Install smoke detectors near the computer area.
d. Burst water pipe
Keep electronic devices off the floor.
Store backups in a waterproof container or cloud storage.
e. ISP failure
Have a backup internet solution, like a mobile hotspot.
Download important files for offline access.
What other scenarios do you think are important to plan for?
Hardware Failure: Regularly backup data and keep spare parts or replacement plans.
Data Breach: Use strong, unique passwords and enable two-factor authentication. Regularly review account activity for unauthorized access.
Software Crash: Keep software updated and create regular restore points.
Physical Theft: Encrypt sensitive data and use tracking software for devices.
5. Classify each of the following occurrences as an incident or disaster. If an occurrence is a disaster, determine whether business continuity plans would be called into play.
answer:
a. A hacker breaks into the company network and deletes files from a server.
Classification: Incident (potentially escalating to a disaster if critical data is lost)
Business continuity plans involvement: Yes, if critical data is lost or compromised, business continuity plans would be initiated to restore operations and mitigate further damage.
Steps to restore operations:
Isolate affected systems to prevent further damage.
Assess the extent of the breach and data loss.
Restore deleted files from backups if available.
Investigate the breach to identify vulnerabilities and prevent future attacks.
Law enforcement involvement: Yes, law enforcement may be involved to investigate the cybercrime.
b. A fire breaks out in the storeroom and sets off sprinklers on that floor. Some computers are damaged, but the fire is contained.
Classification: Incident
Business continuity plans involvement: Yes, if critical systems or data are affected, business continuity plans would be enacted to minimize downtime and ensure operational resilience.
Steps to restore operations:
Assess the extent of damage to computers and other equipment.
Replace or repair damaged equipment.
Restore data from backups if necessary.
Conduct fire safety inspections and implement measures to prevent future incidents.
Law enforcement involvement: Unlikely, unless arson is suspected.
c. A tornado hits a local power station, and the company will be without power for three to five days.
Classification: Disaster
Business continuity plans involvement: Yes, business continuity plans would be invoked to ensure essential operations continue despite the power outage.
Steps to restore operations:
Activate backup power sources if available.
Prioritize critical operations and allocate resources accordingly.
Communicate with stakeholders about the situation and expected downtime.
Arrange alternative work arrangements if necessary.
Law enforcement involvement: Unlikely, unless the tornado caused deliberate damage or there are safety concerns.
d. Employees go on strike, and the company could be without critical workers for weeks.
Classification: Disaster (in terms of business disruption)
Business continuity plans involvement: Yes, business continuity plans would be implemented to mitigate the impact of the labor shortage.
Steps to restore operations:
Assess the impact of the labor shortage on operations.
Implement contingency plans, such as hiring temporary workers or redistributing tasks.
Negotiate with striking employees to resolve the issue.
Communicate with customers and stakeholders about the situation and any potential delays.
Law enforcement involvement: Typically not involved unless there are legal disputes or safety concerns related to the strike.
e. A disgruntled employee takes a critical server home, sneaking it out after hours.
Classification: Incident (with potential to escalate if sensitive data is compromised)
Business continuity plans involvement: Yes, if the stolen server contains critical data or services, business continuity plans would be enacted to mitigate the impact.
Steps to restore operations:
Report the theft to law enforcement and provide any relevant evidence.
Assess the data stored on the stolen server and determine the extent of the breach.
Implement security measures to prevent further unauthorized access.
Restore data from backups if necessary.
Law enforcement involvement: Yes, law enforcement would be involved to investigate the theft and recover the stolen server.