Uncategorized

Cybersecurity-DRBCP

D&J Services

Memo

To: Jason Savage, CEO of Advanced Research

From: CEO of D&J Services

cc: John Spoon

Date:

October 2, 2014

Re: Cybersecurity DR / BCP

As you are aware, disaster recovery plans are the crux of a business continuity plan as it provides the opportunity for you business to continue running in the face of an attack against your IT infrastructure. It is my goal to provide your company with a product that protects the company’s confidentiality and integrity while ensuring it is still available to your customers despite the presence of a threat. It is a known fact that delayed recovery time can cost companies a significant loss in revenue as the amount of downtime in any system directly affects the production rate for that company.

I have analyzed the research and reached a conclusion that I believe best fits the needs of your company as you work to secure your network against potential Stuxnet threats/attacks. Though there are various ways to halt a Stuxnet attack, I believe the method that best fits your company would be to disable the USB ports of your system. Due to the size of your company, I would further recommend using the 3rd party software developed by Lumension Device Control as this particular company limits access to the USB ports by using an access control list, maximizes confidentiality, and has a setting that allows you to authorize individual use/access in certain time frames. This method is significantly less time consuming than the others outlined in the attached briefing and so assists in your attempts to maximize efficiency while simultaneously maximizing profit.

I have attached all of my findings in the briefing slides attached for your perusal. While I am sure that you will agree with my findings based upon the evidence provided, I am more than willing to discuss my findings and answer any other questions you may have. I look forward to speaking with you further soon.

Kindest regards,

, CEO

Work cited

How can I prevent users from connecting to a USB storage device? (n.d.). Retrieved from http://support2.microsoft.com/kb/823732

Solutions. (n.d.). Retrieved from http://www.myusbonly.com/usb-security-device-control/

The Stuxnet Worm. (n.d.). Retrieved from http://www.symantex.com/en/uk.theme.jsp?themeid=stuxnet

USB storage devices: Two ways to stop the threat to network security. (n.d.). Retrieved from http://searchnetworking.techtarget.com/tip/USB-storage-devices-Two-ways-to-stop-the-threat-to-network-security

View any installed/connected USB device on your system. (n.d.). Retrieved from http://www.nirsoft.net/utils/usb_devices_view.html