93%(15)14 out of 15 people found this document helpful
This preview shows page 5 - 8 out of 11 pages.
Perimeter Defenses:Perimeter defenses such as firewall and VPN management are important aspects of CFZ disaster recovery plan because they assist in monitoring traffic during a recovery process and also ensuring a safe connection for users and clients to the alternate network in orderto get the operation back online and reduce downtime (Velliquette, 2005).
Intrusion Prevention and Protection:This is another component that been built into the recovery plan to ensure that during the recovery process, proper configuration is established to keep virus definition files current and to ensure new threat and vulnerability are detected and prevented to improve the fortification process in order to reduce system downtime and return the system back to normal operations (Velliquette, 2005).Justification of Disaster Response ProtocolThe primary goal of CFZ is to get critical infrastructure, networks and systems back up and running as quickly as possible in order to minimize the potential long term impact on the business. Having a crisis management plan is highly important to coordinate the recovery effort in a systematic way that enables the disaster response team to make quick and effective decisionsthat will limit the impact of such disaster or crisis. Not having this type of systematic plan might cause ineffective decisions to be made and in turn cause an increase in disruption time, which can be very detrimental not only to the business but also to customers, stakeholders and investorsalike (Velliquette, 2005). The presence of an alternate recovery site, an emergency response location and backup data are instrumental to the strategic and tactical implementation of the recovery procedures, without which the recovery process is impossible. Also implementing perimeter defenses, intrusion prevention system and virus protection during the recovery process will ensure that new threats that could impede the recovery process do not arise and increase the magnitude of the already bad situation (Martin, 2005). The survivability of any organization aftera disaster is dependent on the premise of a successful continence planning, which would determine how effective an organization would responds to mitigate the business impacts of suchdisaster (Martin, 2005).Access Control Protocols
Security challenges faced at CFZ due to data breaches caused the management to implement network access control protocols that will provide endpoint assessment, authentication and authorization of entities trying to gain access to their network, while also limiting the privileges of user assigned roles. First, CFZ decided to implement smart cards for employees, which digital certificate and underlying password associated with individual users.