Solved by verified expert:Case Study #2: Integrating Disaster Recovery / IT Service Continuity with Information Technology Governance Frameworks Case Scenario: You have been assigned to a large, cross-functional team which is investigating adopting a new governance framework for your company’s Information Technology governance program. Your first assignment as a member of this team is to research and write a 2 to 3 page white paper which discusses one of the Chief Information Security Officer (CISO) functional areas. The purpose of this white paper is to “fill in the gaps” for team members from other areas of the company who are not familiar with the functions and responsibilities of the Office of the Chief Information Security Officer. Your assigned CISO functional area is: Disaster Recovery / IT Service Continuity (IT Service Continuity is a subset of Business Continuity). Your white paper must address the planning, implementation, and execution aspects of this CISO functional area. Your audience will be familiar with the general requirements for business continuity planning (BCP), business impact analysis (BIA), and continuity/recovery strategies for business operations (e.g. restore in place, alternate worksite, etc.). Your readers will NOT have in-depth knowledge of the requirements / implementation strategies which are specific to restoring IT services which support the critical functions of the business (as identified in a BIA). Note: in your Critical Analyses and Discussion for this case study you will address specific aspects of a governance framework, e.g. COBIT®, ITIL®, or ISO/IEC 27002, which apply to planning and implementation of disaster recovery / IT Service Continuity. Research: Read / Review the Week 3 readings:Find three or more additional sources which provide information about best practices for IT Service Continuity / Disaster Recovery planning, implementation, and execution. (Hint: begin by exploring http://www.ready.gov/business ) For the purposes of this assignment, implementation means the advance work necessary to implement recovery plans by acquiring or contracting for products, services, infrastructures, and facilities. Execution means activating the DR/BCP plans and overseeing the recovery operations. Write: Using standard terminology (see case study #1), write a two to three page summary of your research. At a minimum, your summary must include the following: 1.An introduction or overview of disaster recovery / IT Service Continuity which provides definitions and addresses the reasons why cybersecurity should be specifically addressed in the company’s DR/BCP strategies and plans. This introduction should be suitable for an executive audience. A separate section which addresses the CISO & CISO staff roles and responsibilities during the planning phase of DR/BCP and IT Service Continuity. This section should include identification and discussion of best practices for addressing cybersecurity objectives in the planning process.A separate section which addresses the CISO & CISO staff roles and responsibilities during the implementation phase of DR/BCP and IT Service Continuity. This section should include identification and discussion of best practices for ensuring that cybersecurity objectives are met during the implementation phase. The implementation phase includes such activities as acquisition and contracting.A separate section which addresses the CISO & CISO staff roles and responsibilities during the execution phase of DR/BCP and IT Service Continuity. This section should include identification and discussion of best practices for ensuring cybersecurity objectives are met during the execution phase. The execution phase includes such activities as activating the DR/BCP or IT Service Continuity plan(s) and overseeing recovery operations.A closing section that provides a summary of the issues and recommendations regarding inclusion of Cybersecurity considerations in the company’s DR/BCP strategies and plans. Additional Information You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must comply with APA 6th edition Style requirements. Failure to credit your sources will result in penalties as provided for under the university’s Academic Integrity policy.
case_study_2_rubric.docx
Unformatted Attachment Preview
Rubric Name: Case Study #2 Rubric
Criteria
Needs
Outstandi Acceptabl
Excellent
Improve
ng
e
ment
Needs Significant
Improvement
Missing
or
Unaccept
able
4 points
0 points
Attempted to provide
an introduction to the
case study but this
section lacked detail
and/or was not well
supported by
information drawn
from authoritative
sources.
The
introduction
and/or
overview
sections of
the paper
were
missing or
off topic.
6 points
10 points
Introductio
n or
Overview
for the
Case Study
8.5 points
Provided an
excellent
overview of
disaster
recovery / IT
service
continuity.
The
overview
appropriatel
y used
information
from 3 or
more
authoritative
sources.
Provided an
outstanding
overview of
disaster
recovery / IT
service
continuity.
The
overview
appropriatel
y used
information
from 2 or
more
authoritative
sources.
20 points
18 points
7 points
Provided an
overview of
disaster
recovery / IT
service
continuity.
The
overview
appropriatel
y used
information
from 2 or
more
authoritative
sources.
Provided an
overview but
the section
lacked
important
details about
disaster
recovery
and/or IT
service
continuity.
Information
from
authoritative
sources was
cited and used
in the
overview.
14 points
16 points
Identified
and
Explained
the
Reasons
Why
Cybersecur
ity Should
be
Addressed
in DR/BCP
Strategies
& Plans
Provided an
excellent
discussion
which
included 5 or
more
reasons why
cybersecurit
y should be
specifically
addressed in
the
company’s
DR/BCP
strategies
and plans.
Appropriatel
y used
information f
rom 3 or
Provided an
outstanding
discussion of
4 or more
reasons why
cybersecurit
y should be
specifically
addressed in
the
company’s
DR/BCP
strategies
and plans.
Appropriatel
y used
information f
rom
authoritative
sources.
Provided a
discussion of
3 or more
reasons why
cybersecurit
y should be
addressed in
the
company’s
DR/BCP
strategies
and plans.
Appropriatel
y used
information f
rom
authoritative
sources.
Provided a
discussion
which
included at
least 2
reasons why
cybersecurit
y should be
addressed in
the
company’s
DR/BCP
strategies
and plans.
Appropriatel
y used
information f
rom
authoritative
sources.
0 points
9 points
Provided a discussion of
cybersecurity in the
context of DR/BCP
decision making. The
discussion lacked detail
and/or was not well
supported by
information drawn from
authoritative sources.
This section
was missing,
off topic, or
failed to
provide
information
about cyber
security
consideratio
ns for
DR/BCP
decisions.
more
authoritative
sources.
10 points
Provided
an
excellent
discussion
of CISO &
CISO staff
roles and
responsibil
ities
during the
planning
phase of
DR/BCP
and IT
Service
Continuity
Cybersecur . Identified
ity in the
and
DR/BCP
discussed
Planning
5 or more
Phase
best
practices
for
ensuring
that
cybersecur
ity
objectives
are
addressed
during the
planning
process.
Appropriat
ely used
informatio
n from 3
or more
authoritati
ve sources.
7 points
8.5 points
Provided an
outstanding
discussion of
CISO & CISO
staff roles
and
responsibiliti
es during the
planning
phase of
DR/BCP and
IT Service
Continuity.
Identified
and
discussed 3
or more best
practices for
ensuring
that
cybersecurit
y objectives
are
addressed
during the
planning
process.
Appropriatel
y used
information
from 2 or
more
authoritative
sources.
Provided an
acceptable
discussion
of CISO &
CISO
staffroles,
responsibiliti
es, and best
practices for
integrating
cybersecurit
y into
DR/BCP and
IT Service
Continuity
planning.
Identified
and
discussed 2
or more best
practices for
ensuring
that
cybersecurit
y objectives
are
addressed
during the
planning
phase.
Appropriatel
y used
information f
rom
authoritative
sources.
6 points
Discussion
provided
some
information
about CISO
& CISO
staff best
practices,
roles, and
responsibiliti
es for
DR/BCP
and/or IT
Service
Continuity
planning.
Mentioned
information
obtained
from
authoritative
sources.
4 points
0 points
Discussion provided
some information
about CISO & CISO
staff best practices, roles,
and responsibilities for
DR/BCP or IT Service
Continuity planning but
the discussion lacked
detail and/or was not
well supported by
information from
authoritative sources.
Did not
address
roles &
responsibilit
ies of
theCISO &
CISO
staff for
DR/BCP / IT
Service
Continuity
planning.
10 points
Provided
an
excellent
discussion
of CISO &
CISO staff
roles and
responsibil
ities
during the
implement
ation
phase of
DR/BCP
and IT
Service
Continuity
(i.e.
Cybersecur
acquistion
ity in the
&
DR/BCP
contractin
Implement
g).
ation Phase
Identified
and
discussed
5 or more
best
practices
for
ensuring
that
cybersecur
ity
objectives
are
addressed
during the
implement
ation
phase.
Appropriat
ely used
informatio
7 points
8.5 points
Provided an
outstanding
discussion of
CISO & CISO
staff roles
and
responsibiliti
es during the
implementat
ion phase of
DR/BCP and
IT Service
Continuity
(i.e.
acquistion &
contracting).
Identified
and
discussed 3
or more best
practices for
ensuring
that
cybersecurit
y objectives
are
addressed
during the
implementat
ion phase.
Appropriatel
y used
information
from 2 or
more
authoritative
sources.
Provided an
acceptable
discussion
of CISO &
CISO
staffroles,
responsibiliti
es, and best
practices for
integrating
cybersecurit
y into
DR/BCP and
IT Service
Continuity
implementat
ion (i.e.
acquistion &
contracting).
Identified
and
discussed 2
or more best
practices for
ensuring
that
cybersecurit
y objectives
are
addressed
during the
implementat
ion phase.
Appropriatel
y used
information f
rom
authoritative
sources.
6 points
Discussion
provided
some
information
about CISO
& CISO
staff best
practices,
roles, and
responsibiliti
es for
DR/BCP
and/or IT
Service
Continuity
implementat
ion.
Mentioned
information
obtained
from
authoritative
sources.
4 points
0 points
Discussion provided
some information
about CISO & CISO
staff best practices, roles,
and responsibilities for
DR/BCP or IT Service
Continuity
implementation but the
discussion lacked detail
and/or was not well
supported by
information from
authoritative sources.
Did not
address
roles &
responsibilit
ies of
theCISO &
CISO
staff for
DR/BCP / IT
Service
Continuity
implementa
tion.
n from 3
or more
authoritati
ve sources.
10 points 8.5 points 7 points
Provided
an
excellent
discussion
of CISO &
CISO staff
roles and
responsibil
ities
during the
execution
phase (i.e.
activating
and
overseeing
recovery
Cybersecur
operations
ity in the
) of
DR/BCP
DR/BCP
Execution
and IT
Phase
Service
Continuity
. Identified
and
discussed
5 or more
best
practices
for
ensuring
that
cybersecur
ity
objectives
are
addressed
during the
execution
phase.
Provided
an
outstandin
g
discussion
of CISO &
CISO staff
roles and
responsibil
ities
during the
execution
phase (i.e.
activating
and
overseeing
recovery
operations
) of
DR/BCP
and IT
Service
Continuity
. Identified
and
discussed
3 or more
best
practices
for
ensuring
that
cybersecur
ity
objectives
are
addressed
during the
execution
Provided
an
acceptable
discussion
of CISO &
CISO staff
roles and
responsibil
ities
during the
execution
phase (i.e.
activating
and
overseeing
recovery
operations
) of
DR/BCP
and IT
Service
Continuity
. Identified
and
discussed
2 or more
best
practices
for
ensuring
that
cybersecur
ity
objectives
are
addressed
during the
execution
phase.
6 points
Discussion
provided
some
information
about CISO
& CISO
staff best
practices,
roles, and
responsibiliti
es for the
execution
phase of
DR/BCP
and/or IT
Service
Continuity.
Mentioned
information
obtained
from
authoritative
sources.
4 points
Discussion provided
some information
about CISO & CISO
staff best practices, roles,
and responsibilities for
the execution phase of
DR/BCP or IT Service
Continuity but the
discussion lacked detail
and/or was not well
supported by
information from
authoritative sources.
0 points
Did not
address
roles &
responsibilit
ies of
theCISO &
CISO
staff during
the
execution
phase of
DR/BCP / IT
Service
Continuity.
Appropriat
ely used
informatio
n from 3
or more
authoritati
ve sources.
phase.
Appropriat
ely used
informatio
n from 2
or more
authoritati
ve sources.
10 points
8.5 points
Provided
an
excellent
summary
of the
issues and
recommen
dations
regarding
inclusion
of
Cybersecu
rity
Summary considerati
of Issues & ons in the
Recommen company’s
dations
DR/BCP
strategies
and plans.
Separately
addressed
each
phase, i.e.
planning,
implement
ation, and
execution.
Appropriat
ely used
informatio
n from
authoritati
ve sources.
Provided
an
outstandin
g summary
of the
issues and
recommen
dations
regarding
inclusion
of
Cybersecu
rity
considerati
ons in the
company’s
DR/BCP
strategies
and plans.
Separately
addressed
each
phase, i.e.
planning,
implement
ation, and
execution.
Appropriat
ely used
informatio
n from
authoritati
ve sources.
Appropriat
ely used
informatio
n from
authoritati
ve sources.
7 points
Provided
an
acceptable
summary
of the
issues and
recommen
dations
regarding
inclusion
of
Cybersecu
rity
considerati
ons in the
company’s
DR/BCP
strategies
and plans.
Addressed
all three
phases:
planning,
implement
ation, and
execution.
Appropriat
ely used
informatio
n from
authoritati
ve sources.
6 points
Provided a
closing or
summary
section
that
addressed
some of
the issues
and
recommen
dations
regarding
inclusion
of
Cybersecu
rity
considerati
ons in the
company’s
DR/BCP
strategies
and plans.
Mentioned
at least
one of the
three
phases:
planning,
implement
ation, and
execution.
Mentioned
informatio
4 points
Provided a closing or
summary section that
mentioned
cybersecurity issues
and
recommendations.
Or, this section was
not well supported by
information from
authoritative sources.
0 points
Summary
section
was
missing or
not
relevant to
this
assignmen
t.
Professiona
lism:
Addressed
security
issues
using
standard
cybersecuri
ty
terminolog
y
5 points
Demonstrate
d excellence
in the
integration
of standard
cybersecurit
y
terminology
into the case
study.
n obtained
from
authoritati
ve sources.
2 points
4 points
Provided an
outstanding
integration
of standard
cybersecurit
y
terminology
into the case
study.
3 points
0 points
Used
1 point
standard
Integrated
cybersecurit
standard
y
cybersecurit
terminology Misused standard
y
but this
cybersecurity
terminology
usage was
terminology.
into the into
not well
the case
integrated
study
with the
discussion.
Did not
integrate
standard
cybersecurit
y
terminology
into the
discussion.
2 points
5 points
Professiona
lism: APA
Formatting
for
Citations
and
Reference
List
Work
contains a
reference list
containing
entries for
all cited
resources.
Reference
list entries
and in-text
citations are
correctly
formatted
using the
appropriate
APA style for
each type of
resource.
4 points
3 points
Work
contains a
reference list
containing
entries for
all cited
resources.
One or two
minor errors
in APA
format for
in-text
citations
and/or
reference list
entries.
Work
contains a
reference list
containing
entries for
all cited
resources.
No more
than 3 minor
errors in APA
format for
in-text
citations
and/or
reference list
entries.
Work has no
more than
three
paragraphs
with
omissions of
citations
crediting
sources for
facts and
information.
Work
contains a
reference list
containing
entries for
cited
resources.
Work
contains no
more than 5
minor errors
in APA
format for
in-text
citations
and/or
reference list
entries.
0 points
1 point
Work attempts to credit
sources but
demonstrates a
fundamental failure to
understand and apply
the APA formatting
standard as defined in
the Publication Manual
of the American
Psychological
Association (6thed.).
Reference
list is
missing.
Work
demonstrat
es an
overall
failure to
incorporate
and/or
credit
authoritativ
e sources
for
information
used in the
paper.
4 points
5 points
Professiona
lism:
Organizati
on &
Appearanc
e
Submitted
work has
minor style
Submitted
or
work shows formatting
outstanding flaws but still
organization presents a
and the use professional
of color,
appearance.
fonts, titles, Submitted
headings
work is well
and suborganized
headings,
and
etc. is
appropriatel
appropriate y uses color,
to the
fonts, and
assignment section
type.
headings
(per the
assignment’s
directions).
14 points
Work
contains
minor errors
in
No
formatting,
formatting,
grammar,
grammar,
spelling or
spelling, or
punctuation
punctuation
which do not
errors.
significantly
impact
professional
appearance.
15 points
Professiona
lism:
Execution
Overall
Score
3 points
Organization
and/or
appearance
of submitted
work could
be improved
through
better use of
fonts, color,
titles,
headings,
etc. OR
Submitted
work has
multiple
style or
formatting
errors.
Professional
appearance
could be
improved.
2 points
Submitted
work has
multiple
style or
formatting
errors.
Organization
and
professional
appearance
need
substantial
improvemen
t.
13 points
11 points
Errors in
formatting,
spelling,
grammar, or
punctuation
which
detract from
professional
appearance
of the
submitted
work.
Submitted
work has
numerous
errors in
formatting,
spelling,
grammar, or
punctuation.
Work is
unprofession
al in
appearance.
Needs
Outstandi Acceptabl
Excellent
Improve
ng
e
90 or
ment
80 or
70 or
more
56 or
more
more
more
1 point
0 points
Submitted work meets
minimum requirements
but has major style and
formatting errors. Work No work
is disorganized and needs submitted.
to be rewritten for
readability and
professional appearance.
4 points
Submitted work is
difficult to read /
understand and has
significant errors in
formatting, spelling,
grammar, punctuation,
or word usage.
Needs Significant
Improvement
36 or more
0 points
No work
submitted.
Missing
or
Unaccept
able
0 or
more
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more