Cyber Security Planning

Content
1. Cyber Security Planning
○ Business Continuity Plan
○ Incidence Response Plan
○ Disaster Response Plan
○ Succession Plan
2. Computer Forensics
Cyber Security Planning:
Cyber Security Planning in an organization or business is done to protect
the infrastructure from damages caused by unexpected incidence cyber
attacks and natural disasters etc.
Type of Planning:
● Business Continuity Plan
● Disaster Response Plan
● Incident Response Plan
● Succession Plan

1. Business Continuity Plan:
BCP is a plan that allows a business team to plan in advance what it needs
to do to ensure that its key products and services continue to be delivered
in case of a disaster or cyber attack.
2. Disaster Recovery Plan:
DR Plan allows a business to plan what needs to be done immediately
after a disaster or attack to recover from the event. It include set of
procedures to recover and protect a business IT infrastructure.
3. Incident Response Plan:
Incident response planning is the documented and coordinated method of
addressing and managing a security breach or attack.
This incident response plan outlines: The response personnel and the
strategies that will be used to mitigate the incident.
4. Succession Plan:
It is a process in which new leaders are identified and developed to
replace the old leaders when they retire, leave or die.
The organization ensure that employees are recruited and developed to
fill each key role in the company.
The goal of this planning to make the business continuity in case most
important person left its work.
Computer Forensics
Computer Forensics is a process of collecting, analysing and reporting on
digital data in such a way that is presentable in a court of law.
It is used in detection and prevention of crime or any disputes.
Forensics is done in steps:
1. Securing Areas
2. Documenting Scene
3. Data collection
Top Computer Forensics certifications are CCE, GIAC etc