Discussion on following points?
1.Disaster Recovery
2. User Authentication
The aim of this report is to develop and present two procedure and policies on disaster recovery and user authentication in an organization. The focus is kept of an Information Technology Consultancy and how they develop a disaster recovery and a user authentication policy for their organization.
For the user authentication policy, the focus will be on password based user authentication policy.
Name of the Organization: ABC Information Technology Consultancy
Disclaimer: This policy has been created for ABC Information Technology Consultancy. All or part of this policy is owned by the organization. No part of it is reproducible in any form.
Last Update: 9th March 2015
Disasters can happen anytime. But it is likely that disaster happens rarely. Sometimes management ignores considerations about disasters while managing their core business processes. But this should not be the case. A disaster recovery plan should be developed as early as possible, and the organization needs to follow the same. A disaster can be any event that can cause difficulties in providing service successfully, a disaster is not only the catastrophic environmental issues that may damage resources or hamper services. A contingency plan helps in gaining some competitive advantages on the face of disasters. The disaster recovery plan can be considered as a part of the business continuity plan.
The disaster recovery policy provides a baseline to the disaster recovery plan. The plan is yet to be developed based on this policy. The plan will describe the process of recovering the Information Technology infrastructure including information systems, data, applications etc. It covers up all type of disaster that can cause a bigger outrage.
The disaster recovery policy is directed to the information technology management staffs of the organization. They are responsible for keeping the plan up to date and ensuring development and implementation of the disaster recovery plan. This policy will include all requirements that are needed for developing a disaster recovery plan.
It is recommended that the disaster recovery policy is reviewed annually for ensuring the relevancy of it. The planning team will be responsible for developing the policy. The planning team consists of personnel from upper management, IT, information security, sales, accounts, human resource etc. The planning team will have the following roles and responsibilities,
The organization will follow the procedures described below to implement the disaster recovery policy across the organization.
The disaster recovery policy will follow some continuous procedures as describe below.
After developing a disaster recovery plan, the management will test the implementation of the plan. It will help to uncover the cases where the plan may fail. And corrective options or extension of the plan can be developed.
There may be set of methods that will help to ensure compliances with the disaster recovery policy. For example, there may video monitoring, internal and external audits, reports from business rolls, feedback from the owner of the policy etc.
The management should approve any exception to the policy during the early stage of implementation of the policy in the organization.
The staffs, who may fail to comply with the disaster recovery policy, will be subjected to different disciplinary action. Even they may be terminated from their job.
None
Version |
Date |
Description of Changes |
1.0 |
Creation of the policy |
Name of the Organization: ABC Information Technology Consultancy
Disclaimer: This policy has been created for ABC Information Technology Consultancy. All or part of this policy is owned by the organization. No part of it is reproducible in any form.
Last Update: 9th March 2015
Use authentication is a broad domain and applicable to many situation. This user authentication policy covers the simpler user authentication method based on user name and passwords. This policy will cover best practices to provide user name and password based authentication process, how to secure the passwords, what are needed to be avoided etc. Use name and password based authentication can be applied to different cases. For example, it can be used to secure user accounts, email accounts, access to computer, smart phones, tablet etc.
ABC Information Technology Consultancy uses username and password based authentication process to secure their IT resources like computers, restricting access to database, securing email accounts of the users.
This user authentication policy will provide a baseline for the user authentication plan and information security policy for the organization. The purpose is to secure information technology resources from unauthorized access and at the same time ensuring availability of the same to the legitimate users only.
This policy is applicable to the computers, emails, accounts of the employees in the MIS system of the organization, user accounts to the database. (Heng, 2009)
The user authentication policy is directed to the staffs of the ABC Information Technology Consultancy. They need to adhere to the policy to ensure information security implementation and access policies to the information security resources. User authentication policy covers a significant part of the information security implementation at the organization.
This policy will include all details to ensure user authentication process based on username and passwords, at different types of applications and scenarios at the organization.
The policy contains information about the password creation and management along with best practices to follow for ensuring the user authentication process. (Janulaitis, 2007)
Creation of Passwords
While creation of username and password, following factors are needed to be considered.
Changing Passwords
Protection of the Passwords
Being an information technology consultancy, ABC Information Technology Consultancy works on application development. User authentication plays important roles in this domain also. Following factors are to be considered while ensuring implementation of user authentication policy in application development.
This is a specific area of user authentication based on authentication by private and public keys. There should be a mathematical relationship between system and public key. Public key will be known to all. On the other hand, the private key will be known to the user only. User need some passphrase to gain access to the system and unlock the private key. (SANS Institute, 2014)
A passphrase is a type of longer password containing multiple words. This is used to ensure security against dictionary attacks. There will be combination of upper and lower levels of alphabets, special characters etc.
There will be set of different methods and tools to ensure and check compliance with the user authentication policy. Some methods and tools are password cracking methods and tools, internal and external information security audits, feedback from the owner of the policy. The information security team can approve the user authentication policy in advance or along with the information security plan.
If any staff does not comply with the user authentication policy then the staff may face legal issues or may be expelled from the job.
Version |
Date |
Description of Changes |
1.0 |
Creation of the policy |
References
Apelbaum, Y., 2007. User Authentication Principles, Theory and Practice. s.l.:Fuji Technology Press.
Cumbie, B. A., 2008. The Role of Information Technology in Effective Recovery and Aiding Sustainability of Coastal Regions After a Disaster. s.l.:ProQuest.
Fallara, P., 2003. Disaster recovery planning. s.l., IEEE.
Heng, G. M., 2009. A Manager’s Guide to Implement Your IT Disaster Recovery Plan. s.l.:GMH Continuity Architects.
Hiatt, C. J., 2000. A Primer for Disaster Recovery Planning in an IT Environment. s.l.:Idea Group Inc (IGI).
Information Resources Management Association, 1999. Managing Information Technology Resources in Organizations in the Next Millennium. s.l.:Idea Group Inc (IGI).
Information Resources Management Association, 2002. Issues & Trends of Information Technology Management in Contemporary Organizations. s.l.:Idea Group Inc (IGI).
Janulaitis, M. V., 2007. Disaster Recovery – Business Continuity Plan Template. s.l.:Janco Associates, Inc..
Khosrowpour, M., 2003. Information Technology and Organizations. s.l.:Idea Group Inc (IGI).
Kim, T.-h. & Fang, W.-c., 2010. Security Technology, Disaster Recovery and Business Continuity. Jeju Island, Springer.
Kizza, J. M., 2015. Guide to Computer Network Security. s.l.:Springer.
Kouns, J. & Minoli, D., 2011. Information Technology Risk Management in Enterprise Environments. s.l.:John Wiley & Sons.
Management Association, 2013. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. s.l.:IGI Global.
Mattord, M. W. H. & Green, A., 2013. Principles of Incident Response and Disaster Recovery. s.l.:Cengage Learning.
Microsoft, 2013. Authentication Policies and Authentication Policy Silos. [Online]
Available at: https://technet.microsoft.com/en-in/library/dn486813.aspx
[Accessed 9 March 2015].
O’Gorman, L., 2003. Comparing passwords, tokens, and biometrics for user authentication.. s.l., IEEE.
Ruiz-Martinez, A., 2013. Architectures and Protocols for Secure Information Technology Infrastructures. s.l.:IGI Global.
SANS Institute, 2014. Disaster Recovery Plan Policy – SANS Institute. [Online]
Available at: https://www.sans.org/security-resources/policies/general/pdf/disaster-recovery-plan-policy
[Accessed 9 March 2015].
SANS Institute, 2014. Password Policy – SANS Institute. [Online]
Available at: https://www.sans.org/security-resources/policies/general/pdf/password-protection-policy
[Accessed 9 March 2015].
Senft, S., Gallegos, F. & Davis, A., 2012. Information Technology Control and Audit. 4th ed. s.l.:CRC Press.
Watters, J., 2013. Disaster Recovery, Crisis Response, and Business Continuity. s.l.:Apress.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download