Saturday, December 28, 2019

Business Continuity Plan For White House Security Staff

Plan purpose The main purpose of this paper is to prepare a business continuity plan for the White House security staff during any natural or manmade disaster on geographic locations in order to carry out daily activities in an efficient and effective manner. This plan provides an effective guidelines that is required to be followed by the security staffs of White House under such circumstances in order to protect the security staffs from severe personal injuries and accidents and the CIA triad of information and assets as well. In this paper, the business continuity planning is elaborated using the plan objective, plan scope, plan scenarios, plan assumptions and recovery strategies and activities. Plan objective The main objective of this business continuity planning is to overcome the aftermaths of disaster either man made or natural to initiate daily activities in a timely manner without interrupting in service. The main objectives of business continuity plan are as follows: ï‚ § To ensure the safety of the White House security staffs, and other visitors who are in the company’s premises during the time of an incident. ï‚ § To protect the assets and information of the White House ï‚ § To provide a backup plan to carry out daily operations depending on the degree of impact i.e. high, medium and low. ï‚ § To relocate security staffs and other members to a safe place ï‚ § To relocate service providers upon loss of data to initiate daily operations ï‚ § To protect White House reputation inShow MoreRelatedBusiness Continuity Plan For A Business1425 Words   |  6 PagesIntroduction Business Continuity Plan (BCP) is made in order to continue business operation when the business site is adversely affected by some natural calamities like flood, storm, earthquake, fire, communication failure or by some terrorist attacks and crimes. This plan explains the measures taken by the organization to recover its business operation or operation transferred to another business site. Business continuity plans are made to recover from both short term and long term disasters. Plan Purpose:Read MoreTakeaways From The Ocie Cybersecurity Initiative Risk Alert And Sweep Exams1391 Words   |  6 PagesOCIE Cybersecurity Initiative Risk Alert and Sweep Exams July 15, 2015 Todd P. Ehret Cybersecurity is finally now top priority at the Securities and Exchange Commission (â€Å"SEC†) as it was included in the 2014 National Exam Priorities. After the release of the annual priority list, the SEC promptly held a Roundtable in March of 2014 where SEC Chairman Mary Jo White highlighted that cybersecurity threats are global and pose a grave risk to our economy, critical infrastructures, financial markets, andRead MoreCardinal Health, A Leader s Healthcare Industry On Many Fronts Essay1259 Words   |  6 PagesCardinal Health is a leader in healthcare industry on many fronts. Split into many segments, Cardinal brings to the table a wide array of business offerings to the healthcare industry to include distribution of branded and generic pharmaceuticals, over-the-counter (OTC) healthcare products and pharmaceuticals, consumer healthcare products, manufacturing and preparation of radiopharmaceuticals, distribution of medical supplies across the globe and even specialt y solutions for pharmaceutical manufacturersRead MoreHafford furniture Essay1927 Words   |  8 Pagespurchasers across the United States. Hafford relied on a Business Information System (BIS) to handle all the internal business processes. The BIS was seamlessly connected to a VAN-based EDI system, which served as the customer’s interface for making orders. In 2008, Hafford’s entire IT infrastructure and data storage were destroyed by a massive hurricane. Hafford was able to restore the company data with its disaster recovery plan, but not all its IT function. In March 2009, VP of IT proposedRead MoreMitigating Computer Fraud in the Online Environment2273 Words   |  10 PagesOnline Environment Introduction Crime on the Internet is creating stunning losses for people as well as organizations of all kinds (Internet Crime Complaint Center, 2009; Mensch Wilkie, 2011). The necessity to inform and educate faculty, staff, and students of the diversity of threats and methods to protect and mitigate organizations and individuals from these threats is practically a moral imperative. People who lack the fundamental skills and knowledge to safeguard themselves and theRead MoreNsa Capstone Project Essay16270 Words   |  66 Pages................................3 Staff Training .............................................................................................................5 Teacher Training ........................................................................................................6 INTRODUCTION......................................................................................................................... 7 Purpose of The Project Quality Management Plan .. ................................Read MoreA Report On Network Security Audit4059 Words   |  17 Pages Network Security Audit Jed Johnson, CGAP City Auditor Major Contributor Roshan Pulikkiel IT Auditor Christy Rodriguez, CPA Staff Auditor August 18, 2015 Report 201505 â€Æ' Table of Contents Page Authorization 1 Objective 1 Scope and Methodology 1 Overall Conclusion 2 Background 3 Management Accomplishments* 5 Opportunities for Improvement 6 AuthorizationRead MoreEssay on Electronic Personal Health Record - Implementation Piece2517 Words   |  11 Pagesimplementation plan of the EPHR. .Implementation Phase One: Cost Analysis The first phase of our implementation plan will look at cost analysis. The organizations complete budget needs to be reviewed.. First step is to evaluate the total cost of the EPHR and distribute that cost to the required activities for implementation while not forgetting to include such hidden costs as the cost of hired trainers, publishing of training materials, licensing fees, and salaries of staff members trainingRead MoreCloud Computing Security67046 Words   |  269 PagesSECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 SECURITY GUIDANCE FOR CRITICAL AREAS OF FOCUS IN CLOUD COMPUTING V3.0 INTRODUCTION The guidance provided herein is the third version of the Cloud Security Alliance document, â€Å"Security Guidance for Critical Areas of Focus in Cloud Computing,† which was originally released in April 2009. The permanent archive locations for these documents are: http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf (this document)Read MoreImaginary Business Action Plan Essay5508 Words   |  23 PagesImaginary Business Action Plan For this item of course work I have been asked to produce a comprehensive study into starting an imaginary business of my choice in the Ballymena district in which I live. To help me proceed through this I will develop an inclusive action plan which will allow me to see how well Im progressing through the time that I have been given. The action plan will also help me with the points that I must cover to ensure this study is comprehensive

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.