ForumsDiscussion board forums for Mission Plan 6

This document contains a list of discussion board forums for the mission plan listed in the title above. Each discussion board forum listed in this document has a matching entry in your Blackboard Discussion Board folder as a forum. Since all that is contained in the Blackboard Discussion Board forum entry is a link to this document, you must follow the instructions detailed here for each discussion board forum assignment.

When you are ready to contribute to the Discussion Board forum, be sure that you make your entry within a new Thread and for the correct forum. To get information on how to use the Blackboard Discussion board, click on the following link: http://screencast.com/t/PQU6znZhIpp

 

All discussion board assignments are required and are worth 3 points. For information pertaining to the grading detail, please view the rubrics for each discussion board entry within Blackboard.

To access a discussion board topic, click on the appropriate topic link below:

Topic 6-1: Analyze an enterprise level disaster recovery plan.

Topic 6-2: Analyze the requirements of a personal information technology disaster recovery plan.

Topic 6-3: Discuss general topics pertaining to this mission plan.

 


Topic 6-1: Analyze an enterprise level disaster recovery plan.

A disaster recovery plan (DRP), even if minimal, should be developed by all businesses, state and federal agencies, and even households.   For this discussion board you will need to download a check list to help you build a disaster recovery plan from this link: COIS DRP Template. This DRP review check list was developed in 2009 by the California Office of Information Security (COIS) for state agencies.  There are 32 meaningful items listed in this document and even though they are California state agency related items, they all have significant merit.  

Assume that you work as an information technology security administrator for Northcentral Technical College and that you were instructed to provide some suggestions as to what should be on the top ten list for disaster recovery plan items for the school. I would like you review the 32 items listed in the COIS check list (attached to the discussion board forum) to help you identify these items and then I would like you to place an itemized list of your 10 choices ranked in descending order of importance  (item number 1 will be the most important, whereby item number 10 will be the least important).    I would also like you summarize your choices with one paragraph to state your reasons.

 


Topic 6-2: Analyze the requirements of a personal information technology disaster recovery plan.

Create a similar checklist that you did in Topic 6-1, however base your decision on your own personal DRP objectives.   At a minimum, however, you must provide one or more of the following items:

  1. What is it that you need protected and WHY?
  2. What kind of data backups must you perform and where should they be stored?
  3. Provide at least 5 items.

 


Topic 6-3: Discuss general topics pertaining to this mission plan.

For this discussion board you are required to report on two of the items listed below. To make this discussion more interesting, please reflect on a topic that has not be reported on, if this is not possible add your own personal reflections to an existing post.

  1. Why would a key say “Do not duplicate”?    Speaking of locks, what is the vulnerablity of cipher locks?
  2. Where does the RFID tag get its’ power from?   Does your driver's license have an RFID - if so, how is it used?
  3. Would a mantrap just catch men?  How?  Why? Where? When?
  4. How can you make a fence unclimbable?   When would you do such a thing?
  5. Where does a token get its’ code from?   Is a token secure?   What happens when a token gets stolen or lost?
  6. Is a security policy automatically enforced?  Explain your answer!   Give some examples of a security policy or sub-policy.
  7. Are all fires created equal?  Explain your answer!  Why does this chapter talk about fires?
  8. What is involved in computer forensics and why?
  9. What is a DRP?   Give some examples.