Description Planning

Description Planning

Assessment Description

Planning is a quintessential bedrock of any program in the professional world. IT and cybersecurity are no different in this foundation. We plan for the worst and hope for the best.

For College of Science, Engineering, and Technology students enrolled in the course, this assignment will be Phase 1 in the creation of your “Programmatic Business Continuity Plan Project” that will be completed in stages throughout your programmatic courses. The project will be finalized and submitted in CYB-690 or ITT-660, depending on your major. Review “Business Continuity Plan (BCP)” and the topic Resources for details about the project.

As you begin the project, it is important to select an industry that is of interest to you. You may select virtually any industry including retail, education, telecommunications, health care, finance, etc. Create a fictional business within this industry to be the basis for your project. As you develop your project, imagine yourself in the role of the Chief Intelligence Officer for Master of Science in Information Technology and MBA in Cybersecurity students, or the Chief Information Security Office for Master of Science in Information Assurance and Cybersecurity and Master of Science in Cybersecurity students.

In this assignment, complete the first stage of our Business Continuity Plan (BCP) by developing the primary outline for a BCP to identify key aspects of the organization.

It is important to remember that according to the definition provided in ISO 32302, a BCP is “documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following a disruption.”

Review the topic Resources associated with ISO 27001 and NIST SP 800-53 and conduct your own research about each to prepare for this assignment.

Reference the “FEMA Small Business Continuity Plan Template” and “Risk Assessment Matrix” located in the topic Resources to complete the assignment. The FEMA template can be used but copying and pasting any section of the document for the assignment constitutes plagiarism and will be treated as such. Use your own words when filling out each section of the BCP.

Develop the Phase 1 content for your company’s BCP. Phase 1 should include all the following:

Executive Overview: Be precise and detailed and provide a detailed understanding of the program.
Document Change Control: Chart should be completed.
Introduction: Include the Overview, Plan Scope, and Applicability that evaluates the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs, Plan Objectives, and Plan Assumptions.
Risk Assessment Matrix Template: Complete the “Risk Assessment Matrix Template” provided as this element is not shown in the sample BCP template.
Critical Business Functions Overview: Detail components that are critical to business operations and provide a clear understanding of what the program is designed to address.
Company Organizational Chart: Create your own as this is not shown in the sample template. Include the following key positions: CEO, CFO, CIO, CISO, and COO.
Submit the BCP including the completed “Risk Assessment Matrix Template” and Company Organizational Chart.

Note: Retain a copy of this assignment for the Business Continuity Plan, which will be finalized and submitted in either CYB-690 or ITT-660, depending on your major.

Support the BCP with a minimum of three scholarly resources.

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

This benchmark assignment assesses the following programmatic competencies:

MBA Cybersecurity

5.2: Evaluate the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs.

MS Information Assurance & Cybersecurity

2.1: Evaluate the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs.

How do you place an order?

It takes a few steps to place an order with Us:

  • The first step is to place your order. You will need to provide us with some basic information about your project.
  • Once you have placed your order, you will be taken to our secure payment page.
  • Once we receive your order, we will carefully review it and match you with a writer who has the skills and experience.
  • Stay in contact with the writer and discuss vital details of research.
  • Your completed proposal will be delivered via email within the specified deadline.

You are secure when using our service

It's critical for each client to feel secure. As a result, we at Research Proposal Writing take precautions to secure your data.

Financial security You may securely pay for your purchase using a variety of secure payment methods.
Personal security The personal information of our clients is secure. Nobody else will have access to it.
Academic security We use a specialized program to check every completed paper to ensure that we deliver no-plagiarism samples.
Web security This website is safe from unauthorized breaches. We maintain our privacy management in line with the latest laws and regulations.

You can get help placing your order. If you have any questions about our services, please contact us. Our support staff is accessible 24 hours a day, 7 days a week.

If you're still looking for a way to improve your grades and hire expert writers, we've got you covered. Place an order on our website, and we'll help you with any paperwork you want. We will exceed your expectations.

Order now Get a quote