Cyber Security Business Continuity Plan

1119 Words3 Pages

Cyber Security Business Continuity Plan

The cyber security department will ensure that the organization will have continual protected access to the organization’s network. The protected access of the network will be available 24 hours a day and 7 days out of the week. The protected access will also be available during emergencies. Emergencies will not hamper or hinder the organization’s ability to access the network. Arrangements have been put in place for emergencies to have protected access to the network. The cyber security department will continual strive to improve their services. “Cyber-attacks on a Process Control Network (PCN) pose a risk to the operation” (Henry, 2009, p.223). The uninterrupted, protected access to the organization’s network is the top priority of the cyber security department.

Risk Analysis

Network hackers are forever inventing ways to break into the computer systems of organizations. Their aim is to take adventure of the susceptibilities of the system. Hackers remain only limited by the created activity of their minds. Hackers have the time, capability, and experience to infra trace any system. The organization has the responsibility to prevent hackers from infra tracing their system. Organizations remain required to plan for the assaults of hackers. Organization can only be better prepared to defend against hackers, if the organization has taken the necessary action to hinder the hackers’ assaults. There remain various ways in which an organization can prepare to do battle with hackers. The first step to battling hackers is for the organization to have an excellent understanding of its abilities and capabilities. Security analysis systems remain invented to aid organizations in the process of un...

... middle of paper ...

...artment is also devoted to employ the latest technology and methodology to maintain and operate the organization’s network. Emergencies will not interrupt the operation of the organization’s network. The network will remain available at all times. The protection and continual operation on the network is top priority for the cyber security department. The cyber security department will protect the organization’s network with the best interest of the organization as their principle.

Works Cited

(2005). Security Director's Report. IOMA's, (ISSUE 05-1), 3.

Henry, M. H., & Haimes, Y. Y. (2009). A Comprehensive Network Security Risk Model

for Process Control Network. Risk Analysis: An International Journal, 29( Issue2), 26.

McGee, A. R., Vasireddy, S. R., & Xie, C. (2004). A Framework for Ensuring Network

Security. Bell Labs Technical Journal, 8( Issue 4), 21.

Open Document