Free Essay

Risk Managmeent

In:

Submitted By cknapik
Words 2318
Pages 10
1. Analyze strategic pre-incident changes the company would follow to ensure the well-being of the enterprise.

Pre-incident plan for changes the company should take in advance of a disaster. First, our company needs to develop a team which should consist of someone from each department. The next order of business would be to organize, develop and administer a preparedness program that should include training, procedures, etc. With EPLAN, the main pieces for a disaster program would be around data. This company data is its key. This does not just contain customer data, but each individual’s data and their work needs to be backed up. Also they will need a plan for backing up all human resources filing and information, billing and finance and marketing data. First steps would be for the team to assemble a list of what are some of the hazards and assess the risks of losing this data. Second they would need to conduct an impact analysis plan to see if this will hurt the business. Third examine ways to prevent hazards from happening. With a company such as EPLAN, the team would evaluate all data and where the data is housed. Some servers are currently overseas but most data is stored in the office of Farmington Hills, MI. The server room is not protected by any Fire protection walls. The company data for employees are on their computers and are currently not being backed up onto the server as most of the employees work from home. The only employees that are backed up on the server are out of the Farmington Hills office. This office is where the Finance and human resource departments are located. So all of the electronic documentation is housed on the in house server but there currently they do not have a data warehouse to back up this data. All marketing data is housed on the marketing manager’s computer with no back up. This position works out of the home and has all data on laptop. Now that we know where each data location is stored, we can take it to the next step of what to do in advance of a disaster. First is the concern of the main customer data and any technical support data that is housed on the internal server. There are two things that need to be addressed in this scenario. One – current server room set up and two – data warehouse location for backup. The plan needs to include a fire safe room for all servers so in the case of a fire, the data is protected. Second, routing to a data center. First thing to think about it is where to house the data. If a natural disaster where to hit this area, we do not want all data in the same vicinity. Most likely in a different climate at least 3-4 states over or more. Currently we have a sister company based in Houston and some of the employees work out of this location so it would be a good contender for a data warehouse location. Next is the concern of all employees who are not currently on any server. Each employee should be given a back up drive to house all data. There should be processes that every so many days that the employees are required to back up data on this drive. This isn’t the best solution so the company can look into a possible cloud service for backing up data. 2. Analyze the ethical use and protection of sensitive data.

All customers have the right to have protection of their data whether they consider it to be sensitive or not. As a business, we need to be sure that we are ethical with their data and protect it at all costs. Not only do we need to protect our customer’s data but also our employees. Our employees trust that any information given to the company in confidence will be protected such as social security numbers, payroll information, any reviews, write ups, complaints filed and much more.
First let’s discuss our strategy on protection of sensitive data and the ethical use of this data for our customers and what this data entails. This data needs to be protected and comply with laws, regulations, policies within the country and company. We have legal and ethical responsibilities to protect the privacy and confidentiality of all gathered customer data. We will need to create a privacy and confidential policy for all customer data with guidelines and procedures on how to protect their data. Also since some companies pay with credit card information there needs to be Data Security Standards for all payments made by credit card.
First we need to create degree of data sensitivity levels. Bottom level is public that is defined as not protected and made public to employees. This data could include basic policies of how the company is to use data. What is included publically in their contracts? Middle level is sensitive that is data that is not disclosed without good reason due to private information and is protected by company procedures and have high ethical standards. This data is data that cannot be disclosed without the right clearance level in the company. The next level is confidential. This level is the most highly protected data such as company financial records; credit card information which needs to be protected by security standards and this is anything that is protected by laws, regulations, and our contracts.
Employees also need procedures on how to protect individual privacy and reducing the potential for identity theft. First we need to create degree of sensitivity levels for data for employee too. Bottom level is public that is defined as not protected and made public to anyone in the organization. This data could include basic policies of the company such as dress codes, work hours, employee handbooks. Middle level is sensitive that is data that is not disclosed without good reason due to private information and is protected by company procedures and have high ethical standards. This data includes employment data such as salary data, employee personal information such as race/ethnicity, any special needs, etc. The next level is confidential. This level is the most highly protected data such as employees reviews, any financial data such as 401k, social security numbers, date of birth, drivers license #’s, health records and any banking information.
Now that we know what data levels are assigned, we need to know how to protect the data in case of emergency. One of the simplest strategies is strong passwords. Making sure that employees follow a strong password policy such as capital letters, numerical values, symbols are some examples. This will protect the information for the customers they are working on. Limiting access to all customer data is also important. Just because an employee works with a customer does not mean that they should have access to all data. So clearance levels should be in effect due to job titles. Another factor is a high security data system. Protecting the customer data is first priority. Encryption of all data is necessary and finding the right tools to be effective will be important. Also an anti-phishing software program is another option. It will alert you to any fraudulent activities when detected against your customer’s data.
Having firewalls, anti-phishing, levels of security are important but educating the employees is even more important. Developing policies and regular training for employees on how to handle customer data is extremely important. Regular updating of documentation and policies will go far in protecting all data. This works the same for personal employee information. 3. Analyze the ethical use and protection of customer records.

First we need to analyze the ethical use and protection of our customer’s records. This is a common threat to any organizations information systems. It comes from inadequate protection of company information and data. There are many risks that go with unauthorized activity of customer data. The impacts are negative and not always considered during the risks assessments of their data.
Through the business impact analysis/risk assessment phase, the organization will evaluate its security process for all of its internal and external data and how well their security system holds up to external viruses and usage. The loss, destruction and/or disclosure of company data and information may have far more significant consequences and should be included for consideration in the continuity process (The Definitive Handbook of Business Continuity Management, ch. 16 ).
This first stage involves the analysis and decision-making that will feed into planning and strategy to ensure overall business continuity for the organization as well as to understand which approaches are needed throughout the organization in order to deliver a workable information availability strategy. Often this process will involve an external consultant and/or one or more individuals in the organization in order to understand the internal and external pieces of the business which involve both the business and IT operations. By prioritizing their importance and time criticality companies can begin to determine the directions the information availability strategy will lead as well as which individuals within the company should run it. Once plans have been formulated, keeping them in line with the organization is very important to the ongoing success of the company, this shows the need for business continuity provision to incorporate ongoing plan maintenance and testing, which will highlight any changes required as the business moves.
After the organization decides which data is sensitive and which data needs to be protected, they have formulated their strategy to protect the data. Now how do they know this strategy will work? They need to test it with a pilot group that has certain rights depending on their clearance level. By testing to make sure the employees cannot access the sensitive data will ensure that the policies are in effect.

4. Discuss the communication plan to be used during and following the disruption.

Our communication plan includes a brief background of the plan, who it involves (stakeholder analysis), clear objectives, strategy for communicating the plan, and potential issues and risks of the plan. This plan is to address any customer and employee communication, safety and security of their protected information, recovery of information due to a disaster and how to communicate this plan to all stakeholders. Our stakeholders include customers, employees and executives. Everyone it may affect. The customers are affected by the data they provide to the company. During the disruption, all customers will be informed that their data is protected by the security measures that have been put into place by IT with an expected timeline for resolution. They should already have copies of all policies on risk management by the company. Next they need to be informed on the strategies that have been put into place to recover the data. It is extremely important that the customer be involved through all the steps so that they are secure with the company. Next the need to communicate to them after the data has been recovered and depending on the situation of data loss, how they will be able to access their data. If it was a facility fire, the location of the back up facility and the server information that will be encoded for their specific company needs to be communicated. Next, the employees will need the same assurance that their personal data will not be leaked out. So again through the company policies and efforts, the company will need to communicate the security measures that were taken to keep their data safe. The encryption, servers, etc. Lastly, the executives need to be briefed on all moving parts. This communication is essential to the business as they are the ones that will be face to face with all people involved.
Communication Plan for Customers
Customers require accurate, timely and apologetic communications, usually via email including: * What products or services you won’t be able to provide at the usual times * What alternate accommodations they can make * Any compensation we plan to make depending on the disaster * Timeframe of the expected resolution
Communication Plan for Employees * HR to keep open communication with Employees and ensure that their personal information has not been compromised * Follow up with them on the risk management strategies that have been put into place * Keep communication open to resolve any concerns employees have about the recovery

5. Discuss restoring operations after the disruption has occurred (post-incident).

Restoring operations after a disruption is one of the most common pieces to any disaster plan. The most common and most effective plan is data backup which EPLAN uses. This recovery is done by retrieving the data from their data warehouse that is in compliance with all regulations. This warehouse can be accessed externally through a cloud server. This is important to keep backups done daily with a backup tape system. This way historical data is not compromised.
Now, there is the concern of restoring actual operations if a disaster occurs. The Information technology team would work with the data warehouse to make sure the data for our customers and internal employees has been restored but being an international company, most of our data is housed on our German server so operations will not be affected. All employees will be able to access the same data through their own portable laptops and Germany’s server. Germany and other countries will be able to back up our technicians for support calls if needed. This is part of our recovery policy for all countries. The customer’s should not feel any downtime due to our recovery time. The main part will be making sure everything is secure and that the employee records are secure. The team will have to follow our recovery plan and checklist to ensure that everything is safe and accessible to the right teams.

Similar Documents

Free Essay

Problem Statement

...SCATTERGOOD V/S DAPHNE SCENARIO 1 : Scattergood is a HR of a company .Scattergood is anxious about involving subordinates in decision making of company , fearing a loss of authority and support. Scattergood thinks that because his organisation is constantly under pressure with tight deadlines to meet, he doesn’t have time to let employees join in the decision making process. Scattergood ‘s arguments : 1. He believes that participation would not work in his organisation 2. Scattergood is afraid of losing his authority if he gives his employees a chance to share in the decisions made in his organisation. 3. He believes if he disagreed with their decision he would have to overrule them and his authority and support would be undermined. 4. There is not enough time to let his employees participate in any decision-making. SCENARIO 2 : Daphne is another HR who has same authorities as scattergood & she argues back to scattergood Daphnes’ Arguments 1. If you allow your employees a voice in the decisions that affect them, they are more likely to support the final choice. 2. I feel that the decisions I am making are better since I have included my subordinates in the process. They are often closer to the problem than I am and, as a result, they can raise questions that I have not considered. 3. I have as much authority as I ever had and perhaps even more. In terms of my ability to get things done, I would say it has definitely increased...

Words: 312 - Pages: 2

Premium Essay

Behavioral Finance

...Japan Julian Diaz III and Alan J. Ziobrowski Georgia State University Nico B. Rottke European Business School Using data from three countries that differ economically, culturally, and geographically, this study examines the role of Prospect Theory’s reflection effect, a psychological factor, in combination with Uncertainty Avoidance (UA), a cultural factor, on the choice of mortgage products. Experiments were conducted using business professionals in the United States, Germany, and Japan. The results suggest that risk-averse people tend to become more risk seeking, leaning more toward adjustable-rate mortgages (ARMs) when choosing a mortgage type, and that this psychological effect may underlie the mortgage choices of people who tend to choose ARMs, even across countries with different cultures. Keywords: Adjustable-rate mortgage, Fixed-rate mortgage, Prospect theory, Uncertainty avoidance, Experiment INTRODUCTION In terms of household risk management, the choice of a residential mortgage is one of the most significant decisions to make. At the end of second-quarter 2005, the value of outstanding U.S. residential mortgages was $8 trillion, 65% of the 2005 GDP (Federal Reserve Board of Governors [2005] In Germany, the residential mortgage debt ratio as a percentage of GDP was 51% at the end of 2006 (European Mortgage Federation). In Japan, the value of outstanding residential mortgages was 190 trillion Yen in 2005, which was 36% of the GDP (The Government Housing...

Words: 7970 - Pages: 32

Premium Essay

Inf Security

...INF 370 – Information Security – Week #4-1 attendance check 1. Read the article “Privacy and Security / Emotion and Security” by Rose McDermott published in Communications of ACM, February 2012: http://dotlrn.aubg.bg/dotlrn/classes/departmentofcomputerscience/sINF370/INF370S12/file-storage/view/Handouts/Privacy_and_Security_-_Emotion_and_Security-Communications_of_ACM-February2012.pdf Make a short resume (about 200 words) of the publication. Responses to presumed threats or attacks are usually emotionally based. People tend to misunderstand or shift their attention to risks that are not very high while forgetting about the not-so-obvious threats. However, these threads are in most cases far more dangerous than the obvious and easy to predict dangers. According to Prospect Theory models individuals tend to weight probability not in the linear fashion advocated by standard normative models of probability theory, but rather the subjective functions that overvalue certain low-probability events. Fear and anger make people anxious and nervous, cause them to make worse decisions and make mistakes. 2. Using AUBG Web find what information security policy, standards, practices and procedures exist. What is the most important for a policy to be effective? http://www.aubg.bg/RapidASPEditor/MyUploadDocs/Information_Security_Guide.pdf For a policy to be effective it needs to be observed and applied. No matter how great a policy is if people do not comply...

Words: 254 - Pages: 2

Premium Essay

Conflict Resolution Paper

...life as opposed to a part-time movement. Finally the effectiveness of the team is measured by the group’s collective outcomes.   Further, weighing the pro’s and cons to involvement of groups in decision making process can be cost effective. Research confirms that groups outperform the average individual by a long run. Therefore, our text mentions five important issues to consider when utilizing groups to making team building decisions. Groups are less effective than any one individual. The concept “two head are better than one” rings very clear in an environment setting. A group who presents the elements of over-confidence can foster “groupthink”. Our text defines some symptoms of groupthink which includes invulnerability where optimism and risk taking is embedded, rationalization- Eventually leadership roles take into account the situation and the members must agree upon something regardless of what others want, illusion of unanimity- silence is interpreted as agreement. These are the individuals who are unsure about a subject and decides...

Words: 797 - Pages: 4

Free Essay

Tourism Essay

...There are many factors such as attitude, perceptions to influence people’s mind while making a decision to go on a holiday. Tourists’ decision-making relates to their behaviours. In this way, in order to share as much market as possible, it is worth to analyzing people’s behaviours. This assay will be evaluated in three sectors namely; psychological, personal, and social. (Marketing-consumer behaviour) First of all, within psychological field, motivation is being considered the most important one. There are dissimilar factors behind complex motivation. To be simplified, it is much understandable to analyze motives by Maslow’s(1970) Hierarchy which in order are physiological, security, social, esteem and the last, self actualisation needs. As soon as people achieve amount of level, they move on to the next stage gradually. For instance, in first stage human have physical needs such as hunger or thirsty; when they achieve the fulfilment, they move on seeking for higher order needs like security. (Cooper, Fletcher, Fyall, Gilbert & Wanhill, 2008) Attitude is another vital key of tourist decision making. Attitude is composed by cognitive, affective and conative. Cognitive, in other word, is called the belief or knowledge which based on previous experiences, individuals’ own opinion to the place or getting the information from other people; the affective describes the feelings and emotions about the destination and assess the experience basing on emotions; the...

Words: 979 - Pages: 4

Free Essay

Budgeting Is a Key Component in Management Short and Long Term Planning

...machine guards shall be inspected by the equipment operator to determine that it is safe condition prior to each use for example defective guards. b) Reporting procedure for workplace safety and health issues Firstly they have to identify for examples unsafe equipment, unsafe condition/environment, injuries, near misses or even illnesses. Report to the immediate supervisor on site. The supervisor will write a report and the management will provides feedbacks on the issues and addressed it quickly. Before that the supervisor and the workers will act on the issues on hand immediately. c) The identification and reporting of potential hazards and resolving risk associated with work The 3 steps that are being used are hazard identification, risk assessment and risk control. Workers that observed and identify the potential hazards will report to the supervisor or manager seen in that area. Supervisor or manager will write a report and sent it to the safety department. All hazards reported are reviewed at the end of the month. Monthly hazard inspections are conducted every month using a hazard checklist. Job safety checks to see potential hazards while the workers are working and safety audits conducted by the safety department would result in written report and recommendations for improvement. d) Activation of emergency services In case of emergency such as illnesses or injuries the person at scene first will call for ambulance...

Words: 438 - Pages: 2

Premium Essay

A Case Study on How to Manage the Theft of Information

...major companies have caused concern. These thefts were caused by companies’ inability to determine risks associated with the protection of their data and these companies lack of planning to properly manage a security breach when it occurs. It is becoming necessary, if not mandatory, for organizations to perform ongoing risk analysis to protect their systems. Organizations need to realize that the theft of information is a management issue as well as a technology one, and that these recent security breaches were mainly caused by business decisions by management and not a lack of technology. After counter-terrorism and counter-intelligence, cyber crime is the third highest priority for the U.S. Federal Bureau [4]. With the rise of the theft of information and the lure of big profits for this stolen information, it is necessary for information systems to have the ability to protect this valuable asset. It is estimated that a credit card number unsupported by any other documentation is worth $10, and a credit history report retails for $60 [2]. Recent breaches of information systems that have lead to thefts of information have shown that management practices and not technology was part of the issue and in some cases the primary cause of the theft of the information. With each of these thefts, there is a third party committing a crime, but in each case, risk analysis could have been used to avoid or to help mitigate the theft....

Words: 3469 - Pages: 14

Premium Essay

Revision

...implication is showed in the reward system; the rewards are going to be given to the individual. Where in the other hand, collectivist mindset represent the group instead of themselves. Each mindset should be treated accordingly. Power Distance (who is making the decision) Culture that are low power distance sharing of power is a must. The employees are expected to be involved in the decision making. Managers need to learn how to make the decision via power sharing. People with high power distance mindset tends to operate under instructions. Leadership management style needs to be customized. Uncertainty Avoidance; how decision is made High uncertainty avoidance = Low risk taker and vice versa. The decisions are made quickly as the quickest as possible manner is important. Low uncertainty avoidance= high risk taker Masculinity (equality in the workplace) Managers needs to understand when they are working in the Masculine culture, they need to accept it not to change it. For example: no female managers to middle east. Long term short term Planning, setting goals, target, and objectives. Short term wants to achieve everything in the shortest period as possible. QUESTIONS 3 1st part: current theories give reason to motivate people. 2nd part: whether the framework will work motivating * Maslow’s needs * McLalend Goal setting theories and rules setting theories are content and process theory. Why motivation always connected to satisfaction of needs? needs = univerasal...

Words: 311 - Pages: 2

Free Essay

Sensitity Analysis

...Scenario The Smith family annual reunion is on the first Saturday in May. There is a possibility of cool or rainy weather on that day. The family has reserved free space at a local park for their event. An additional charge, one of the pavilions that will provide shelter is available. If the weather is bad and the shelter is not rented, then the event may need to be canceled and family members will have spent the money for travel and preparation needlessly. Should the family spend the extra money to rent the shelter, even though it may not be needed? Sensitivity Analysis In the Smith reunion scenario, the dependent variable is the rented of the pavilion while the independent variable is the weather conditions. Sensitivity analysis is a technique that determines how different values of an independent variable will determine a particular dependent variable under a given set of assumptions (Pannell, 1997). One of the uses for sensitivity analysis is assessing the “riskiness” of a strategy or scenario in order to make a decision by identifying key values. Its purpose is to minimize variable (stricture) number calibration and determine what parameters will have the greatest impact on simulation precision. One Parameter Analysis A one-way sensitivity analysis evaluates the changes the impacts the results of a situation by identifying the key drivers (Taylor, 2009). On the day of the Smith family reunion, weather conditions are the determining factors as to rent...

Words: 559 - Pages: 3

Premium Essay

Hanson

...1. To escape their dependency on a single industry, Monmouth managed to reduce their business risk by acquiring small different industrial manufacturers in addition to becoming a market player in the hand tool business, by acquiring 3 of the market leaders, a move that diversified Monmouth’s business and ultimately reduced their business risk. In analyzing the financial risk, the continuous acquisitions have definitely increased the operational risk for the company. Since the case didn’t provide us with the financial statements for Monmouth, we can assume that in order to complete the acquisition they have to issue stocks as they exhausted (or will pretty soon exhaust) their debt capacity. 2. Based on the DCF valuation and using a WACC of 8.25% (the beta assumed to be 1, the average beta of comparable firms and the coupon rate to be 7.96%, the rate for BB rated companies) and a growth rate of 5.5%. The fair price is $40.4 per share for Robertson, lower than the $50 offered by Simmons to sell their stocks but higher than the current market price of $30. As for the peer multiples, and due to the lack of information for the comparable companies we only managed to calculate the EBIAT multiple, the earnings multiple and the book value multiple using the three comparable companies, Actuant Corp, Snap On Inc., and Stanley Works. The result of the multiple valuation showed a fair price of $40.1 per share based on the EBIAT multiple and a value of $29.61 per share based on the...

Words: 681 - Pages: 3

Free Essay

Animal

...Veterinary medicines are used to keep animals healthy and include wormers, antibiotics and vaccines. Veterinary medicines can also cause harm if they are not used properly. Veterinary Medicines Legislation The information I have obtained applies to the Veterinary Medicines Regulations 2006 which display the procedures, manufacture, controls, supply and use. It is enforced to protect the health and safety of farmers and people using veterinary medicines in their day to day work. However each individual is responsible for the own health and safety and the health and safety of others around them. Health and safety of use of Veterinary Medicines on farms help the people who administer the product to do so safely and make sure that health risks...

Words: 1088 - Pages: 5

Premium Essay

American Home Product

...in antihypertensive, tranquilizers, and oral contraceptives. The company has almost debt- free balance sheet and growing cash reserves (40% of net worth in 1981). AHP was able to gain this huge success in these lines was by marketing expertise. CULTURE OF THE BUSINESS AHP's corporate culture distinctive and this culture had several components. First, the company's culture was known to be reticence. A second element, that the managerial philosophy of AHP was prudence and had a strict financial control. For example, all expenditures that are greater than $500 had to be personally approved by Mr. Laporte, who was the CEO of AHP, even if was authorized in the corporate budget. Another important component of AHP's culture was conservatism and risk aversion. Finally, The Company has a long- standing policy of centralizing, where the chief executive had complete authority. STAGES OF DEVELOPMENT AHP's managerial philosophy was proven to be successful as it produced impressive results. AHP's financial performance was stable with consistent growth and profitability. In the year 1981, the firm was able to increase sales, earnings, and dividends for 29 years. However, this growth has been steady between 10% and 15% annually. Moreover, AHP had 25% return on equity in the 1960's, but it has risen tremendously to 30% in the 1980's. AHP had been able to finance this growth internally while paying out almost 60% of its annual earnings as dividends. Unfortunately, AHP's price- earnings ratio...

Words: 2139 - Pages: 9

Premium Essay

Family Dollar External Environmental Analysis

...Biblical Principles in Decision-Making Billy Manning Belhaven University MLS650: STRATEGIC MANAGEMENT August 20, 2013 Biblical Principles in Decision-Making Process Every manager and leader has to go through the decision-making process. It is my belief that the process should begins by applying biblical principles in an effort to discern the will of God. God delights in revealing His will to those who are eager to follow His precepts. For example, in our decision-making process, managers and leaders should apply the same attitude of Jesus when he said, “Not My will, but your will be done” (NKJV, 2009). As managers and leaders, we should welcome the Spirit of God in our decision-making because the Spirit of God will guide you into all truth, and it is without error. He will not lead or speak on his own authority, but that of God himself, and will declare the things to come” (NKJV, 2009). Manager and effective leaders should not make any plans without involving God. For example, James says that we make decisions to go places to buy, sell, and make profit not knowing what will happen the next day. James makes it clear that we ought to say, “If the Lord wills” making Him an essential partner in our decision-making process. God’s revelation of what He wants us to do come through His word. For example, God tells us that His word is a lamp to our feet and a light to our path (NKJV, 2009). We can count on this Biblical principle to guide us in our darkest moments of seeking...

Words: 453 - Pages: 2

Premium Essay

Week 3 Fin/370

...The risk associated with initiative and financial status of Disney provides an array of information to include development, and future performances. Increased competitor pressure internationally and domestically provides challenges and leads to additional marketing challenges to remain at the top of the food chain in the Theme Park Industry. The financial status of the United States economy and international economic struggles provides challenges, which impedes the process of taking on additional loans or investment responsibilities because of the fluctuation in the economy. The economic conditions of Disney provides objectives to manage interest rates by lowering loan cost and maintaining fixed debt ratio between minimum and maximum values set by company guidelines. Foreign policy plays a vital role in risk reduction by providing a hedge coverage with maximum and minimum percentages that does not exceed a five- year threshold. In addition (“VAR”) Value at Risk provides guidelines associated with a potential one- day- lost in normal marketing conditions at a 95% accuracy rate using currency sensitive financial instruments, interest rate sensitive financial instruments, and combined portfolio. In addition there are several risk associated with Disney financial status to include compliance risk, people in the workforce are working longer, which effects the dollar to include the climbing medical cost and increasing wages and the consumer demands during these tough economic, and...

Words: 267 - Pages: 2

Free Essay

Lab #1 Assessment

...Lab #1 – Attack & Penetration Test Plan Answer Sheet Hacking and Countermeasures 6/28/2013 MR. Walker Ramon B Kreher Jared Long Part 1: Table of Contents 1. Introduction 2. Authorization 3. Preliminary 4. Scope 5. Goals & Objectives 6. Test Plan Reporting 7. Test Plan Reporting 8. Projecting Plan and Schedule Part 2: Sample Authorization Letter The Undersigned hereby testifies that they have proper authority and agrees to offer authorization to perform the work that is specified in the statement of work for the penetration test to be conducted by Security Consulting Inc. The systems to be tested shall not be compromised and any vulnerabilities that are discovered shall be kept confidential unless federal, state, or local law requires that they be disclosed or the statement of work specifies otherwise. This Document also certifies that the undersigned testifies that the Client has sufficient disaster recovery systems and insurance in the event of an incident during or after the test procedures. Part 3: Penetration Test Client Questions If black box is selected, do not fill out question 3 or following sections. 1. Black Box | White Box (please circle one) 2. Intrusive | Non-Intrusive (please circle one 3. Test Credentials: (fill in as many as needed) Username | Password | | | | | | | | | | | | | | | E-Commerce Web-based Application Server 1. Authorized to View Source? Yes | No (please...

Words: 652 - Pages: 3