Verified Document

Risk And Vulnerability Analysis Research Paper

Threat Identification The threats

How the threats are detected

Ever since the September 11, 2001 terrorist attacks, businesses have had to critically rethink on the level of adequacy of their disaster recovery arrangements in relation to their business continuity plans as noted by Lam (2002,p.19). The September 11, 2001 tragedy effectively highlighted the importance for organizations to continue with their commercial operations even under the most exceptional of circumstance. My business which has a considerable e-commerce operation is particularly vulnerable to the IT related threats. It is therefore crucial that these threats be identified and eliminated or mitigated before they result to loss of revenue.

In my business, I face several threats. However, the ones that I consider most dominant are technology threats and information threats. These threats can cause a major disruption to the to business continuity planning (BCP) cycle. Technology threats include natural disasters like fire and flooding, system failure, network failure, virus attack as well as network and system flooding (Distributed denial of service attack-DDoS attack ). Information threats on the other hand include...

Parts of this document are hidden

View Full Document
svg-one

These are factors which can lead to information loss, unauthorized access as well as alteration of information.
In our organization, a worse case scenario analysis indicates that system failure and information hacking are the most common threats that can effectively cripple the operation of the organization.

The threats

Business threat 1: System failure

This is a threat to business continuity that affects technology as a resource.

Failure scenario1: Failure affecting some servers with a repair time of between 1 to 2 days.

The business continuity strategy to avert such a system failure

In order to ensure that operations continue in our organization, there is a need for a third party maintenance and support agreement to be signed with a reliable company. There is also a need to have an emergency third-party support agreement that involves an on-site response within the shortest time possible. There is also a need for our business to have redundant servers on standby.

Failure Scenario 2: Failure affecting all serves with a repair time of…

Sources used in this document:
References

Lam, W (2002).Ensuring Business Continuity. IT Pro. Available online at http://paul-hadrien.info/backup/LSE/IS%20490/Ensuring%20Business%20continuity.pdf Accessed on 3/5/2012

Snedaker, S (2007). The Best Damn IT Security Management Book Period. Syngress
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now