Assessment Description Throughout this program, you will be creating a Business Continuity Plan (BCP) based on an industry that is of interest to you. This assignment is a continuation of that project


Assessment Description

Throughout this program, you will be creating a Business Continuity Plan (BCP) based on an industry that is of interest to you. This assignment is a continuation of that project. Using the Business Continuity Plan (BCP) content developed in the previous courses, complete Phase 3. Note: Upon completion and submission, implement any feedback from your instructor. Then, make sure to retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

Special Note: Due to the length of this assignment, it will be started in Topic 4 and completed in Topic 5. Make sure to refer to the appropriate topic Resources as specified.

Prior to beginning this assignment, view “Business Continuity Plan (BCP)” and “Business Continuity and Disaster Recovery” within the “Video Playlist: Policy Management for Security Solutions,” located in the Class Resources.

Part 1: Issue-Specific Security Policies

NIST SP 800-12 Rev 1 recommends three types of information security policies to help organizations create, maintain, and develop an effective Information Security Program, with the objective of reducing risks, complying with laws and regulations, assuring operational continuity, and applying informational confidentiality, integrity, and availability.

One type is Issue-Specific Security Policies (ISSP). For each of the following issues, use “NIST SP 800-12 Rev 1,” located in the topic Resources, to create an ISSP document. Make sure to address the following for each policy: Issue Statement, Statement of the Organization’s Position, Applicability, Roles and Responsibilities, Compliance, Points of Contact, and Supplementary Information.

  1. Use of personal equipment on your company’s network (BYOD)
  2. Internet access
  3. Personal use of company equipment
  4. Removal of organizational equipment from your company’s property
  5. Use of unofficial software

Part 2: Legal Standard Operating Policies and Procedures 

A thorough legal standard operating policies and procedures (SOP) document is the foundation of a good business continuity plan. Standard operating procedures and policies provide the roadmap for management and staff to follow. These steps become the backbone of the business continuity plan, and they must govern every aspect of your chosen company. 

Using the Business Continuity Plan (BCP) – Phase 1 content developed in CYB-515, design a 6- to 8-page manual presenting the legal standard operating policies and procedures to describe incidents including fire evacuation, ransomware attack, power outage, and pandemic situations.

Each policy or procedure must include information related to:

  1. Industry Compliance
  2. Business Operations
  3. Training and Awareness
  4. Disaster Recovery
  5. Incident Response

Support the BCP with a minimum of three scholarly resources.

Part 3: Incident Response

Once an adverse event that has targeted a business is confirmed, it is labeled as an incident. That is the time to activate the incident response plan. After the plan is activated, procedures are followed for incident reaction. Most of the time, the incident is contained. Then, clean-up of all the problems begins and the organization makes a full recovery, with everything back to normal. This is incident recovery. 

Use the guidelines provided by “NIST SP 800-61 Rev. 2: The Computer Security Incident Handling Guide,” located in the topic Resources, to design an Incident Response Plan (IRP) for your company. Include actions to be taken if each of the following adverse events occurs:

  1. Ransomware attack on one PC/user
  2. Power failure
  3. ISP failure

If a disaster renders the current business location unusable for a long time, and there is no alternate site to reestablish critical business functions, what would you suggest in a situation like this? Hint: Use the 8-step model recommended by NIST to develop and maintain a viable BC program for your company. 

Support the BCP with a minimum of three scholarly resources.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.