Running head: BUSINESS COUTINUITY PLAN 1
BUSINESS CONTINUTIY PLAN 2
Business Continuity Plan
On Cyber Hack, Denial of Service, Data Compromise
Table of Contents
Summary…………………………………………………………….……………………….4
University Business Continuity Project……………………………….……………………..5
Purpose……………………………………………………………………………………….6
Business Continuity Plan Objectives…………………………………………………………7
Scope………………………………………………………………………….…….…………7
Different Phases of BCP……………………………………………………….………………7
Assumptions……………………………………………………………………………………8
Testing……………………………………………………………………………….………….8
Project management………………………………………………………………….………….9
Business Impact Analysis………………………………………………………………….…....9
Recovery Strategies…………………………………………………………………………...…10
Institution approach to BCP…………………………………………………………………..…11
Business Impact Analysis of Library in Wilmington University……………………………..…14
Essential Functions ……………………………………………………………………………...16
Necessary Functions ……………………………………………………………………….……16
Desirable Functions ……………………………………………………………………..………16
Disaster Recovery Strategies………………………………………………………………….…17
Support groups………………………………………………………………………………..…19
Team Members …………………………………………………………………………………20
Action Procedures……………………………………………………………………….………23
Disaster Recovery Responsibilities………………………………………………………..……24
Respective teams action plan……………………………………………………………………25
Alerts Process………………………………………………………………………………..…25
Planning using the University website and other sources………………………………..…..…27
Conclusions…………………………………………………………………………………..…28
References…………………………………………………………………………………....…29
Summary
This documentation gives out points of interest relating to BCP and DRP that are practiced and best practices other than the appropriate arrangements for Wilmington University including its library. The report tosses light into various exercises, business offices, disaster examination, groups, obligation of groups, execution of arrangements, guaranteeing that basic functions begin instantly etc. The report additionally gives headings for conceivable emergency courses of action if there should be an occurrence of regular or cyber attack disasters.
University Business Continuity Project
Wilmington University has phenomenal offices in giving learning opportunities to students to various courses. College gives world class offices that help students over the globe to learn diverse courses. The college has library that has extensive variety of study material which can be utilized for learning and research. Not just has the library, the Wilmington University had numerous divisions to bestow learning to students of various nations. College is occupied in all working days with numerous concurrent classes or lectures going on other than numerous different exercises. In this connection, it is vital to have Business Continuity Planning (BCP) that guarantees that the college and its library can deal with crisis circumstances
Having BCP set ...
Presiding Officer Training module 2024 lok sabha elections
Running head BUSINESS COUTINUITY PLAN1BUSINESS CONTINUTIY PLAN.docx
1. Running head: BUSINESS COUTINUITY PLAN 1
BUSINESS CONTINUTIY PLAN 2
Business Continuity Plan
On Cyber Hack, Denial of Service, Data Compromise
Table of Contents
Summary…………………………………………………………….
……………………….4
2. University Business Continuity
Project……………………………….……………………..5
Purpose………………………………………………………………
……………………….6
Business Continuity Plan
Objectives…………………………………………………………7
Scope…………………………………………………………………
……….…….…………7
Different Phases of
BCP……………………………………………………….…………
……7
Assumptions…………………………………………………………
…………………………8
Testing………………………………………………………………
……………….………….8
Project
management…………………………………………………………
……….………….9
Business Impact
Analysis………………………………………………………………
….…....9
Recovery
Strategies……………………………………………………………
……………...…10
Institution approach to
BCP…………………………………………………………………..
…11
Business Impact Analysis of Library in Wilmington
University……………………………..…14
Essential Functions
…………………………………………………………………………
…...16
Necessary Functions
……………………………………………………………………….
……16
Desirable Functions
4. Summary
This documentation gives out points of interest relating to BCP
and DRP that are practiced and best practices other than the
appropriate arrangements for Wilmington University including
its library. The report tosses light into various exercises,
business offices, disaster examination, groups, obligation of
groups, execution of arrangements, guaranteeing that basic
functions begin instantly etc. The report additionally gives
headings for conceivable emergency courses of action if there
should be an occurrence of regular or cyber attack disasters.
5. University Business Continuity Project
Wilmington University has phenomenal offices in
giving learning opportunities to students to various courses.
College gives world class offices that help students over the
globe to learn diverse courses. The college has library that has
extensive variety of study material which can be utilized for
learning and research. Not just has the library, the Wilmington
University had numerous divisions to bestow learning to
students of various nations. College is occupied in all working
days with numerous concurrent classes or lectures going on
other than numerous different exercises. In this connection, it is
vital to have Business Continuity Planning (BCP) that
guarantees that the college and its library can deal with crisis
circumstances
Having BCP set up is essential for crisis administration of the
college including its library. Towards this end it is imperative
to recognize the parts in BCP and set up a BCP. In this manner
the basic elements of the college will keep working even on
account of disasters or unpredicted occasions. Since it is an
education foundation it has scholarly administration and
individuals with high state of aptitudes and splendid students
who look for learning from University. The Disaster Recovery
Planning (DRP) for the college ought to be adaptable and usable
for guaranteeing business progression in the occasion of normal
or cyber attack calamities. There are numerous areas that are
incorporated into the BCP
· New Castle main campus
· Brandywine
· Dover and other locations in Delaware.
· Wilson Graduate Center
· University locations in Dover and Maryland
· Middletown
Purpose
The reason for the Business Continuity Plan is
6. · To lessen the probability of any disaster by the selection of
protection measures.
· To guarantee that all incidents are overseen viably to
minimize interruption and keep the danger of acceleration.
To have these done, there are some plans to be followed
Summarizes the real position of the Collection concerning
disaster chance, shields, managerial tasks and accountabilities
to security measures.
Investigation methods
· Definite methods which can be set up to keep up these
elements alongside the system with respect to supporting the
specific study materials
· Occurrence examination and supervision strategies that
distinguishes disaster diminishment notwithstanding moderation
procedures
· Describes the specific calamity recovery strategies for every
segment of determination administrations conveyance alongside
the system as to managing the specific debacle recovery guide.
The general destinations of this business continuity
methodology are for the most part:
· Provide arranges and perform to recover through the disaster,
which happened.
· Minimize the specific monetary lessening, which winds up
with business interference.
· Meet business continuty and recovery techniques work-
outlines.
· Provide printed material as to further work with to deal with
the dangers effectively.
· Protect truths reference notwithstanding vital data from
hacking and information rupture.
Business Continuity Plan Objectives
· Enabling business continuity disregarding calamities.
· Even find a way to meet administrative and legitimate
commitments
· Ensuring accessibility, trustworthiness and classification
7. · Having alternate courses of action set up when any disaster
takes place
· To guarantee the basic elements of the college are set up and
they fill in of course.
· Protect imperative information that can be utilized to proceed
with business
· Have elective site to do basic capacities
· Minimize money related overhead and lessen the business
intrusion potential outcomes
· Ensure that misfortunes are minimized
· Recovery made at the right time
Scope
· Critical elements of library and different offices.
· Communication
· IT functionalities that is critical for business.
· Personnel, power and systems
Different Phases of BCP
· Project Management deals with functionalities of the
framework
· Analyzing business and its impact to the organization.
· Framing techniques for recovery due to the disaster
· Designing and building up a structure
· Testing the structure, keeping up the BCP, conveying
mindfulness and preparing the staff.
Assumptions
· All the persons recorded in the arrangement are willing and
accessible to work when and where it is required.
· Access to the area will be confined amid the season of
calamity.
· Electronic access to library database is made accessible to the
students and staff in the event of cyber attack incidents.
· The access to the physical area is made accessible once it is
said 'all reasonable' by police authorities.
8. Testing
Once the progression arrangement has been created,
it should be tried so that in any awful circumstance the
application and the arrangement works well and doesn’t fail.
Once the testing procedure is finished a complete reported
record ought to be kept up. On the off chance that the
arrangement works out as planned, then it ought to be
implemented, however in the event that the arrangement
neglects to get together to the desire or neglects to execute
obviously then required steps should be taken to rectify the
deformities which prompted its inability to meet the desire.
Once the fundamental has been finalized, a second testing is
imperative to see if it all goes well. All the important
documentation ought to be accessible to the partners. The
college ought to make it accessible on site and should course
the data in introductions everyone.
Project management
This stage deals with risk examination, setting up
various groups, for example, Business Continuity and
Coordination. Making work arrangement which incorporates
extent of the arrangement, objectives to be accomplished,
strategies to be taken after and the course of events. This stage
produces a report to administration and takes endorsement from
the same.
Disasters strike each spot and any association is
not a special case for this. Nothing can stop these calamities.
The best thing that anybody or any association can do is be best
arranged to face it. Each association must have move down
arrangements to proceed with their business exercises with no
stop in the event of any debacles. Resulting in these present
circumstances case, Wilmington University is no exemption for
this. Along these lines, the college must be best arranged to
9. confront the difficulties postured by nature and cyber attack
disasters. The disasters can strike in any structure. It could be
cyber attack, for example, bomb danger, dynamic firearm
shooter or any characteristic disaster. On the off chance that any
mishap or disaster strikes, it takes away everything. It causes
interruptions to the administrations of an association. To
proceed with their operations and better survival in the business
sector, associations must have their option approaches to serve
their clients. Acknowledging what to do, how to do it, and who
to call can have all the impact between viably recovering
collections with immaterial adversity to bringing a chance with
an entire social affair to significant misfortune.
Business Impact Analysis
· In this stage it is crucial to have talks and formal concurrences
with the administration concerning the time taken for debacle
recuperation.
· Maximum Tolerable Downtime and Maximum Allowable
Outage are to be resolved.
· Quantification of misfortunes is to be completed because of
the business blackout
· It additionally evaluates the conceivable results in view of the
sort of debacle
· There are numerous exercises in the BIA, for example, picking
a strategy, ID of interviewees, get ready poll, data examination,
recognizing vital capacities in the business, finding right MTDs,
use MTDs to rank vital capacities, gauge recuperation
conceivable outcomes, and after that get endorsement from
administration.
Recovery Strategies
Methodologies are to be characterized keeping in mind the end
goal.
· Crucial business capacities
· Supplies and offices
10. · Students, staff and administration
· Data, systems, and server assuming any
· Data reinforcements and applications
Types of strategies that could be followed are as follows:
· Storage storehouses
· Computer systems
· Telecommunication systems
· Having outsider administrations
· Agreements with calamity recovery specialists
· Redundant servers for information recovery
· Having tie ups with administration authorities
· Maintaining reinforcement of information and applications
with industry gauges
· The reinforcement tapes or circles are to be kept in work
environment furthermore 100 miles away from the work
environment.
· Usage of cloud for reinforcement is an imperative choice
because of the rise of the new technology generally.
· Having a system for sort of reinforcement, for example, full,
differential or incremental.
Institution approach to BCP
· Individuals are consistency tested with common and man-made
disasters that can't be counteracted however overseen in better
route by using learning – based crisis administration
frameworks (Dorasamy, Raman and Kaliannan, 2013).
· Businesses in this present reality are progressively subjected
to unforeseen occasions that toss business coherence challenges.
Along these lines the BCP and Disaster Recovery Planning
(DRP) are to be coordinated into a solitary system to
accomplish hierarchical strength (Sahebjamnia, Torabi and
Mansouri, 2014).
11. · Business Continuity Planning (BCP) is the arrangement that
helps associations to recoup from disasters either characteristic
or artificial. BCP suggests the readiness of an association to
withstand startling occasions and guarantee that the basic
business forms keep working (Dey, 2011). Associations
accomplish supported execution with BCP set up (Randeree,
Mahal and Narwani, 2012).
· Risk is one of the central point that are to be tended to if there
should arise an occurrence of disasters that incorporate man-
made disasters, surges, typhoons, torrent, terrorist assaults etc.
Digital assaults – mindful crisis administration is key in the
advanced time (Walker, Williams and Skelton, 2010).
· BCP, DRP and right IT Contingency Planning (ITCP) are to be
incorporated in any association to upgrade BC with 24x365 hour
accessibility of administrations (Wiboonrat and Kosavisutte,
2008).
· High accessibility of information of any business is vital for
BC if there should be an occurrence of fiascos. Regardless of
cataclysms and disturbance of business, it is conceivable to
restore business quickly given the system to high accessibility
of information (Chidambaram, Rao and Aneesh, 2008).
· Critical components in BCP incorporate danger investigation,
announcing a debacle, emergency administration group (CMT),
correspondence arrangement, prioritization of recuperation, and
workforce sway (Costello, 2012).
· There are four stages in BCM life cycle. They comprehend
association, characterizing BCM system, actualize BCM
reaction, Evaluating and enhancing (Rejeb, Bestide, Lamine,
Marmier and Pingaud, 2012).
· Cloud figuring innovation can be utilized to influence an
association's calamity reaction frameworks. Particularly it is
extremely helpful to have cloud based reinforcement for BCM
(Alhazmi and Malaiya, 2013).
· Disaster administration shifts from association to association
in view of the necessities of the associations. For example, in a
health services framework, the supply of medicines if there
12. should arise an occurrence of crises is essential for BC (Mete
and Zabinsky, 2010).
· There are distinctive danger exercises taking into account the
way of risk source. For example, programmers perform danger
activities, for example, unapproved framework access,
interruption, social building and hacking. In the same style,
terrorists perform exercises, for example, framework altering,
framework infiltration, framework assault, data fighting, bomb
impacting (Fallara, 2004).
· In instance of disseminated systems, operators based
frameworks can be utilized for disaster recovery. The method of
reasoning behind this is they bolster crisis chiefs other than
incorporating with legacy frameworks (Fiedrich and Burghardt,
2007).
· A format based data framework can help exact handling of
emergency if there should arise an occurrence of fiascos and
perform recuperation operations speedier (Lee and Bui, 2000).
· Capacity arranging assumes an imperative part in disaster
administration. Case in point, if there should be an occurrence
of a social insurance framework, it is key to have scope
organization in order to execute disaster recovery arranging
precisely (Yi, George, Paul and Lin, 2010).
· Transportation is one of the exercises that are to be considered
for disaster administration. The transportation can help fiasco
alleviation when advanced (Zheng and Ling, 2012).
· Analysis of multi-source satellite information can help in
emergency administration. The earth perception limits in the
advanced period can help in quality getting ready for calamity
administration (Voigt et al., 2007).
· Natural disasters may discharge perilous material that should
be considered in DRP and BCP for adequately restoring
business and shielding the hobbies of partners (Young, Balluz,
and Malilay, 2004).
· Disaster waste administration is likewise one of the elements
to be incorporated into BCP. The basis behind this is the waste
produced by a catastrophe can upset the current waste
13. administration cycle (Brown, Milke and Seville, 2011).
Business Impact Analysis of Library in Wilmington University
The Library Emergency Response Team is the subset of
college's calamity recuperation group. The group comprises of
staff from library and security individual. The group is co-led
by Vice Dean and Library Director. Numerous individuals have
diverse parts before the occurrence, amid the incident and after
the incident. The group ought to be manufactured such that it
ought to meet every one of the prerequisites in emergency.
Some groups may work at an association level, some at area
level. These groups ought to work with great co-appointment. A
few associations may have their partners express their thoughts.
The group ought to have the capacity to take speedy choices in
emergency times and representatives must act keen in executing
the arrangement. The group might be separated into sub groups
to meet the authoritative needs. The controlling advisory group
is extremely critical and imperative in taking choices. The
obligations of these key congruity work force are sketched out
as underneath.
The BIA of the Wilmington University library incorporates
distinguishing basic functions, critical,essential, fundamental,
and desirable functions.
Critical functions are fundamental functions without which it is
unrealistic to run the library easily. Disturbance of critical
functions can prompt harm to the business.
· Backup and calamity recovery choices are fundamental.
· Compliance with lawful and administrative commitments
· Sensors for discovering fire mishaps and to have firefighting
hardware.
· Data reinforcement is one of the basic capacities that can help
in recovery quicker.
Essential Functions
There are some vital functions in the library. The accompanying
14. are crucial in the library of Wilmington University.
· Availability of BCP project concerning library.
· Essential functions that is hierarchical and not individual.
· General operations in the library as for empowering clients to
have great learning background.
· Fundamental operations like getting books, putting away
books and dispersing them to students.
· Communication in the library
Necessary Functions
The functionalities of the library that are extremely customary
and regular are known as important functions. The standard
operations that are required to run library business.
· Functionalities that need choices
· Functionalities relating to computerized library
· Application that is identified with the elements of library.
· Protection of representatives working for library.
Desirable Functions
Attractive capacities give extra elements and security measured
required by the library with regards to calamity and business
coherence.
· Maintaining option parties as for laborers, suppliers and
different parts of the library.
· Having hardware lie scanners and smoke identifiers
· Digital library furnished with extra security measures.
Disaster Recovery Strategies
Apparently the most essential parts of disaster
recovery incorporate the recovery framework by method for
recuperation design plans. The disaster recovery system and
course of action rely on upon an evaluation and business
influence examination of your library and what you need to do
to make them work again in a sufficient time period.
When you have completed the danger relief and
business impact examinations, you ought to need to recognize
15. the fundamental structures and limits, and their recuperation
time targets [RTOs] and recuperation guide destinations [RPOs]
toward portray and attested. You are right away arranged to
make DR recovery frameworks. These methods will help you
with responding to and restore from dangerous occurrences
when they happen. Strategies are utilized to portray the
approaches to manage the required quality so that the measures
of event reaction, response, recuperation and recovery are put
and actualized.
A key way to deal with perceive the differentiation
amidst frameworks and courses of action is that methodology
describe what you plan to do when responding to a scene, while
game plans depict how you will do it. One way to deal with
make strategies is to make a table posting your essential
systems, their RTOs and RPOs, and some other huge
information from your beginning examination. The legend over
the most astounding purpose of the table should fuse the
fundamental structure's name, its RTO and RPO values, the
risks you have recognized for the essential system, and areas
portraying evasion procedures, response frameworks and
recovery strategies.
Next, you can chase down strategies on the Internet. The
Business Continuity Institute has section to countless
intelligence specialists who will be chipper to help you.
Besides, BCI's Good Practice Guidelines is an incredible
hotspot for all parts of business movement organization.
The presentation takes after the initial emergency pages,
and this section fuses the reason and degree of the plan. It
should also figure out who has certified the course of action and
why it ought to endorse start; and it should join linkages to
whatever other appropriate plans and reports. In the parts and
commitments region, we describe the parts and commitments
with respect to disaster recovery associates, [including] their
contact purposes of enthusiasm, spending limits, (for instance,
if gear must be obtained) and their cutoff purposes of force in a
disaster.
16. The scene response zone gets us through the starting
onset of the event. We ordinarily get the chance to be aware of
an out-of-customary situation (say, we get alerts from structure
level alarms). We next quickly examine the condition (and any
mischief) and endeavor to make an early determination of the
event's reality. Next we endeavor to contain the scene and bring
it under control. We moreover exhort organization and other key
accomplices.
Support groups
The most broadly perceived considerations are discussed
rapidly in the going with sections and are proposed as general
guidelines to help you through the technique. You may have
additional segments you have to consider, for instance,
gathering, and offsite data stockpiling, or reflected servers.
Remember to speak to the intriguing components of your Team
Foundation sending when you are making your disaster recovery
arrangement.
This procedure is to guarantee that business is proceeding
disregarding disasters or calamities. Towards this end Recovery
Time Objectives (RTOs), and Recovery Point Objectives
(RPOs) are to be resolved. Disaster recovery should be
fabricated taking into account certain measures.
· Third party administrations can help in expedient recuperation
from disasters.
· The readiness can help in very much educated recuperation
alternatives.
· Emergency administration framework set up can help in
making the association with status.
· Integrated BCP and DRP can help in brisk reaction if there
should be an occurrence of crises.
· Cyber – mindful systems can withstand present day cataclysms
that originate from enemies.
17. · Cloud based capacity choices can help in recuperation choices
with 100% accessibility.
· Best reinforcement and restore alternatives can help in fast
recuperation of information as for IT division
· Hazardous material administration can help in the event of
debacles that discharge such material.
· Continuous change is required as the DRP and BCP are the
procedures yet not occasions.
· Threat examination can help in recognizing dangers and
vulnerabilities to have best accessible arrangements and
possibilities.
· Crisis administration group can help in taking quick activities
· Special recovery administration group is required so as to
execute all around characterized plans.
· Supplier joint effort will have fundamental supplies if there
should arise an occurrence of disasters.
· Protection from digital assaults can help the business
progression
· Template based data framework can help in having very much
educated and exact choices.
· Causality administration system can prompt minimize issues to
people.
· Capacity arranging is required to execute plans.
· Transportation methodology can help in having elective
transport in the event of crises.
Team Members
The points of interest of different groups in the disaster
recovery are to be made accessible to different clients so s to
empower them to have right data for stepping if there should
arise an occurrence of any normal or man-made debacles. This
is the motivation to have crisis contact data is critical.
Here is a case rundown of staff individuals and their contact
data. This rundown is caught from the college library blog
18. James M. McCloskey
Library Director
[email protected]
Phone:(302) 356-6880
Assistant Professor
M.L.S., University of Maryland
B.A., University of Delaware
Barbara A. Beard
Library Assistant
[email protected]
Phone:(302) 356-6873
B.S., Wilmington University
James A. Bradley
Instruction Librarian
[email protected]
Phone:(302) 356-6872
Assistant Professor
M.S., Simmons College
B.S., Pennsylvania State University
Craig S. Conrad
Library Technician II
[email protected]
Phone:(302) 356-6876
Work Hours
Non Work Hours
Event with Warning
· Whether threat is in the surrounding area or the main facility?
· Whether the threat is targeting personnel of organization?
· Whether workforce at the facility remains safe?
· Whether threat is in the surrounding area or the main facility?
· Whether the threat is targeting personnel of organization?
· To whom threat needs to be notified?
19. · Whether it is safe for workforce to come to work on the
ensuing day?
Event without Warning
· Whether the workforce is affected?
· Whether the workforce is taking shelter in facility or
evacuated?
· Which information has come from the first responders?
· Whether the facility is affected by the disaster?
· What information has come from first responders?
· How much time is taken to see organization in operational
mode?
Table 2- Decision matrix to implement a plan
College head will go about as leader and the choices
are made taking into account the accessible data in the choice
framework and the risk. There are numerous spots in
Wilmington University, for example, provincial notice gadgets,
crisis correspondence focus that are a piece of basic leadership.
Neighborhood channels, local capacities and new media are
different things to include in the circumstance. The Wilmington
College may survey the data accessible every once in a while
with a specific end goal to enhance it. It additionally has data,
for example,
· Guidance from government.
· Protection measures relating to workforce in the college
· Instructions relating to execution of basic functions.
· Information with respect to hazard counsels and conformities.
· Reports relating to creative considering.
· Information about conceivable results relating to basic
hardware, working environment offices and specialized gadgets.
· Information with respect to the conceived period and
emergency courses of action
Action Procedures
20. Disaster Recovery Responsibilities
As for disaster recovery on individual must be made
dependable to start activities. There may be a few individuals to
assume such part so far as that is concerned for the job. The
individual (s) would be fit for informing different groups,
considering scope quantification. There should to be a technique
that should be followed in working hours of the college and
other time also.
The general population included in disaster recovery
should have great relational abilities and related knowledge in
taking care of such occasions. There should to be appropriate
activity plan to find the cause for the events. There are
numerous contemplations in the BCP and DRP. Equipment,
programming, and the server machines that include in taking
reinforcement and restore. Indeed, even the cloud based
reinforcement can give best and solid results. The
determinations of equipment establishments and the points of
interest are to be set up. The essential gear should be secured
and in the event of disasters, there should to be elective server
or reinforcement server which bolsters business continuity with
no time gap. The courses of action are to be checked every once
in a while. Mission basic hardware should be wanted to get
secured and guarantee that there are suppliers who can react to
calamity circumstances to give such gear.
The basic functionalities and the staff and related
hardware are to be protected. The information put away in the
archives are to be secured. There must be great IT approach set
up so as to have emergency courses of action. At the point when
information is shielded from disasters, it is adequate to begin
business that is taken into account the online needs of the
client. Dissecting the present status of information and finding a
way to guarantee that the information is not lost and the
information is not given to non-approved clients.
Respective teams action plan
Every group needs to take after certain activities that are
21. utilized to take an interest in the calamity recuperation. To the
extent interchanges are required, the bookkeeper is the in
control who settles on choices identified with different issues.
If there should be an occurrence of crises additionally the
curator should settle on choices relate to the occasion.
Responsibilities:
· Maintaining disaster recovery manual and other data relating
to DR.
· Information relate to disaster recovery group
· Coordinating with the group to start heading for a recovery.
· Maintain different supplies that that are required for recovery
· Maintain data with respect to stores, emergency office, and
possibility organizers etc. Maintain data relating to reclamation
of business and related supplies to guarantee faster recovery.
· Details of all groups including recovery group.
Alerts Process
The Wilmington University keeps up systems and
procedures and any sort of data that is identified with BCP and
DRP. There was deliberate methodology in making such
arrangements and the arrangements are changed now and again.
If there should be an occurrence of crises there is a framework
set up that deals with the notification process and cautions.
There is consultative council that will screen and guide the
required operations. The college has distinctive faculty made in
charge of various exercises.
· The college head may initiate business continuity program.
· The school staff additionally deals with speaking with
emergency administration and relatives.
· Activation of business continuity programs through staff
· Usage of outsider administrations and on location
administrations in light of the need. Activating appropriate
emergency courses of action to guarantee that basic functions
begin early.
22. Planning using the University website
and other sources
There can be multiple ways of planning out and conveying the
message. One of the best ways would be the blackboard
considering the high usage of it.
Area of Concern
Material
Contingency Plan
Blackboard
Web site
Deploy off-site temporarily
Video conferencing
Network infrastructure and class room equipment
Use third party services
Electronic class rooms
Media carts, mounted equipment for video and audio
Get from external suppliers and make ad hoc arrangements
Server failure
Data
Use backups to restore
Documentation
Data
Restore from backup
As the head to make the decision, the specific University
head would help keep the surroundings a safer place for the
people around the university by applying every single
accessible asset like Wilmington University Emergency
Communication Center, territorial warning gadgets,
neighborhood channels and local credit reporting projects and
news media.
The specific Wilmington College may audit every single
accessible data identifying with:
Direction from higher government experts
· The specific assurance associated with staff individuals
23. · An opportunity to execute critical functions
· Adjustments inside risk advisories
· Ability reports
Conclusions
The paper gives us a detailed plan and various strategies to
overcome a disaster and have the business continued in the best
possible way. These methods should be followed by every
university, since educational institutes accommodate young
citizens who wouldn’t be aware of the escape procedures. These
policies would certain educate the students and staff about
disasters. On the other hand it would help the university run
better on the business perspective too.
24. References
Alhazmi, O. H. andMalaiya, Y. K. (2013). Evaluating Disaster
Recovery Plans Using the Cloud.IEEE, 1-6. Retrieved from
http://ieeexplore.ieee.org.sci-
hub.io/xpls/abs_all.jsp?arnumber=6517700
Brown , C., Milke, M. and Seville, M. (2011). Disaster waste
management: A review article, 1-14. Retrieved from
http://ocean.sci-
hub.io/6b9b0fd05e6730921e73c55fd5c81401/brown2011.pdf.
Costello, T. (2012). Business Continuity: Beyond Disaster
Recovery. IEEE, 35-45. Retrieved from http://sci-
hub.io/downloads/4811/costello2012.pdf.
Dorasamy, M., Rama , M. and Kaliannan, M. (2013).
Knowledge management systems in support of disasters
management: A two decade review. Elsevier, 180-200.
Retrieved from http://ocean.sci-
hub.io/61fe111bf79d3199689685ceae7b7cdc/dorasamy2013.pdf.
Fallara, P. (2004). Disaster recovery planning.IEEE, 1-3.
Retrieved from http://cyber.sci-
hub.io/MTAuMTEwOS9tcC4yMDA0LjEzMDEyNDg=/fallara20
04.pdf
FIEDRICH, F. AND BURGHARDT, P. (2007). AGENT-
BASED SYSTEMS FOR DISASTER MANAGEMENT.
COMMUNICATIONS OF THE ACM, 50(3),12.Retrievedfrom
[13] http://moscow.sci-
hub.io/2f006ec48a4129e6a04c0452edebd0c6/fiedrich2007.pdf
Sahebjamniaa, N., Torabi, S. A., and Mansourib, S. A. (2014).
Integrated business continuity and disaster recovery planning:
Towards organizational resiliency. IJCSMC, 14(7), 35-45.
25. Retrieved from http://ocean.sci-
hub.io/df4f030e3f37145d1784e09418778b59/sahebjamnia2014.p
df.
Randeree, K., Maha, A. and Narwani, A. (2012). A business
continuity management maturity model for the UAE banking
sector.Business Process Management Journal, 18(3), 35-45.
Retrieved from http://moscow.sci-
hub.io/a4421b0a014cb4ce3439106245d164e2/randeree2012.pdf.
Rejeb, O., Bastide, R., Lamine, E.,. Marmier, F. and Pingaud,
H. (2013). A Model Driven Engineering approach for Business
Continuity Management in
eHealthSystems.IEEE,17.Retrievedfromhttp://ocean.sci-
hub.io/6867bbaeef5334655a931dad44f285ca/rejeb2012.pdf
OnurMete, H. andZabinsky, Z. (2010). Stochastic
optimizationofmedicalsupplylocationanddistribution in
disastermanagement,19.Retrievedfrom [11] http://moscow.sci-
hub.io/fa7310075701cd25cfe62fcb891fa07c/mete2010.pdf
Lee, J. and Bui, T. (2000). A Template-based Methodology
for Disaster Management Information Systems. IEEE, 1-7.
Retrieved from http://moscow.sci-
hub.io/6ece00689840e4a1c505b7e31155743a/lee2000.pdf
Voigt, S., Kemper, T., Riedlinger, T., Kiefl, R., Scholte, K.
andMehl, H. (2007). Satellite Image Analysis for Disaster and
Crisis-Management Support.IEEE,45(6),19.Retrievedfrom
http://ocean.sci-
hub.io/bfed5aa059797ecab7392db4fc20b01f/voigt2007.pdf
Williams, J. W. B. J. and Skelton, G. W. (2010). Cyber Security
for Emergency Management. IEEE, 12-20. Retrieved from
http://ocean.sci-
hub.io/accddd179e675229395351000dfee243/walker2010.pdf.
Wiboonrat, M. and Kosavisutte, K. (2008). Optimization
Strategy for Disaster Recovery. IEEE, 12-20. Retrieved from
http://cyber.sci-
hub.io/MTAuMTEwOS9pY21pdC4yMDA4LjQ2NTQ0NDY=/wi
boonrat2008.pdf.
Young, S., Balluz, L. andMalilay, J. H. (2004). Natural and
26. technologic hazardous material releases during and after natural
disasters: a review, 1-18. Retrieved from http://moscow.sci-
hub.io/57a3468457e59a6c4506e709d9c322c4/young2004.pdf
Yi, P., George, S. K., Paul, J. A. and Lin, L. (2010). Hospital
capacity planning for disaster emergency management, 1-10.
Retrieved from http://moscow.sci-
hub.io/628ced8a080b18cce3c4d2ea7448b748/yi2010.pdf
Zheng, Y. J. and Ling, H. F. (2012). Emergency transportation
planning in disaster relief supply chain management: a
cooperative fuzzy optimization approach. ,114. Retrieved from
http://ocean.scihub.io/71cc94c7dc4d89906ac7d6ec0454f754/zhe
ng2013.pdf
Final Assignment 10/5/2015
Individual/Team Task:
1. Review the various phases of BCP
2. Review what other libraries have develop as a BCP (Tulane
and Oregon State)
3. Develop a recommended approach for Wilmington University
Library
4. Develop a high level BCP using the MIT Template (This is
the final paper)
5. Develop a Kaltura Slide presentation (This is the final
presentation)
27. Scenario
You and your team just received the following note from the
Library Director – Mr. Jim McCloskey. He
has requested your assistance in developing the BCP.
Hello. We really need help in the library. I would like to
leverage the expertise that you have developed
in SEC6060. Please send me your work for my review. Thanks
for your help!
1. The university is currently developing/updating their
emergency preparedness plan.
2. All WilmU departments, including the library, are being
reviewed and will have BCP contingencies in
this plan so, at this time, there is no specific plan for the
library.
3. I would welcome input to our plan. We are struggling.
4. I would like your recommendations as we go through this
process.
5. I look forward to having an opportunity to read or listen to
your student’s report.
Regards, Jim
Jim McCloskey
Library Director
WILMINGTON UNIVERSITY
Library
Peoples Building
320 N. Dupont Hwy. | New Castle, DE 19720
DO NOT EMAIL Mr. McCloskey if you have questions ---
28. email ---- [email protected]
How to prepare Business Continuity Plan?
Business Continuity Planning Phases
1. Project Initiation
• Define Business Continuity Objective and Scope of coverage.
• Establish a Business Continuity Steering Committee.
• Draw up Business Continuity Policies.
2. Business Analysis
• Perform Risk Analysis and Business Impact Analysis.
• Consider Alternative Business Continuity Strategies.
• Carry out Cost-Benefit Analysis and select a Strategy.
• Develop a Business Continuity Budget.
3. Design and Development (Designing the Plan)
• Set up a Business Recovery Team and assign responsibility to
the members.
• Identify Plan Structure and major components
• Develop Backup and Recovery Strategies.
• Develop Scenario to Execute Plan.
• Develop Escalation, Notification and Plan Activation Criteria.
• Develop General Plan Administration Policy.
4. Implementation (Creating the Plan)
29. • Prepare Emergency Response Procedures.
• Prepare Command Center Activation Procedures.
• Prepare Detailed Recovery Procedures.
• Prepare Vendors Contracts and Purchase of Recovery
Resources.
• Ensure everything necessary is in place.
• Ensure Recovery Team members know their Duties and
Responsibilities.
5. Testing
• Exercise Plan based on selected Scenario.
• Produce Test Report and Evaluate the Result.
• Provide Training and Awareness to all Personnel.
6. Maintenance (Updating the Plan)
• Review the Plan periodically.
• Update the Plan with any Changes or Improvement.
• Distribute the Plan to Recovery Team members.
Business Continuity Plan Outline (simplified based on sample
BCP provided by MIT)
PART I INTRODUCTION
• Organizational Mission Essentials
PART II DESIGN OF THE PLAN
30. • Overview
• Purpose
• Assumptions
• Development
• Maintenance
• Testing
2. Organization of Disaster Response and Recovery
• Steering Committee
• Business Continuity Management Team
• Organization Support Teams
• Disaster Response
• Disaster Detection and Determination
• Disaster Notification
3. Initiation of the Business Continuity Plan
• Activation of a Business Continuity Site
• Dissemination of Public Information
• Disaster Recovery Strategy
• Emergency Phase
• Backup Phase
• Recovery Phase
4. Scope of the Business Continuity Plan
• Overview
• Category I – Critical Functions
• Category II – Essential Functions
• Category III – Necessary Functions
• Category IV – Desirable Functions
31. PART III TEAM DESCRIPTIONS
1. Business Continuity Management Team
• Overview Team
• Roles/Responsibilities
2. Organization Support Teams
• Damage Assessment/ Salvage Team
• Transportation Team
• Physical Security Team
• Public Information Team
• Insurance Team
• IT/Telecommunication Team
• Financial Team
• Legal/Contracts Team
• Human Capital Management Team
PART IV RECOVERY PROCEDURES
1. Notification List
• Contact Information for the various Teams’ members.
2. Action Procedures
• List of Actions to be carried out by each Team.
References
32. “MIT Business Continuity Plan”, 1995.
URL: http://web.mit.edu/security/www/pubplan.htm (26 Sep.
2001)
Kaltura
If you have any questions or need further assistance with
Kaltura or any video or
multimedia topic please feel free to reach out anytime.
UsefulKaltura resources can always be
found at http://www.wilmu.edu/multimedia/Kaltura.aspx or on
Blackboard under the Kaltura Media
Tools tab. Additional video and multimedia resources can be
found
at http://www.wilmu.edu/multimedia/
http://www.wilmu.edu/multimedia/Kaltura.aspx
http://www.wilmu.edu/multimedia/