This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Information security in the business continuity plan

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

Information security in the business continuity plan

 

Student’s Name:

Institution Affiliation:

Date:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chapter 17

Businesses use data networks in connecting with their key stakeholders such as customers, suppliers, and other business associates. Information is an integral aspect of any business and organization as it helps make important decisions for the prosperity and continuity of business. The information must be secured to avoid it running into the wrong hands, which can damage the information system in a business or organization. There are various security layers that are vital to an organization or business security plan policy, such as performing regular backups, implementing strong data security measures, and curbing internal threats.

Chapter 18

This chapter dwells more on the mitigating actions that will solve emergencies encountered at work and the recovery actions for small and contained damage records. Information security should be heightened in the storage rooms and during transit to keep the information safe from environmental threats to be readable upon arrival. The vital record can be stored in media storage, and regular backups performed to safeguard the data against loss. An example is backing up the information in magnetic media storage facilities. Data backup helps in retrieval incase the storage facilities are damaged.

Chapter 19

Vital records recovery is important to any organization or business. Curbing internal threats can help in safeguarding the information against unauthorized access. The records should be effectively retained in the storage facility, and easy accessibility and retrieval by only authorized personnel should be granted. Safeguarding the information against internal threats can be achieved by data encryption is a good security layer for protecting organizational data and information. An example of data encryption is installing passwords to organizations’ information systems to limit access to the data only to the authorized personnel (Wallace & Webber, 2018).

 

References

Wallace, M., & Webber, L. (2018). The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. New York, NY: AMACOM. ISBN-13: 978-0814438763

 

 

 

 

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask