Journalofinformationsystems Educationvol222117teaching Casebank So ✓ Solved

Journal of Information Systems Education, Vol. T e aching Case Ba n k Solutions Disa s t e r Re c o v e ry and B u si n ess Co n tin u it y : A Ca s e St u dy for CSIA 485 S t e ve C a m a r a Senior Manager, KPMG LLP 1021 E Cary Street, Suite 2000 Richmond, VA 23219 s [email protected] Robe r t C r oss l e r Vis h al Mi dh a Assistant Professor Computer Information Systems The University of Texas – Pan American r [email protected] du, v [email protected] Li nd a Wa l lace Associate Professor Accounting and Information Systems Virginia Tech w [email protected] A B S TR A CT Disaster Recovery and Business Continuity (DR/BC) planning is an issue that students will likely come in contact with as they enter industry.

Many different fields require this knowledge, whether employees are advising a company implementing a new DR/BC program, auditing a company’s existing program, or implementing and/or serving as a key participant in a company program. Often times in the classroom it is difficult to find real world practice for students to apply the theories taught. The information in this case provides students with real world data to practice what they would do if they were on an engagement team evaluating a DR/BC plan. Providing students with this opportunity better prepares them for one of the jobs they could perform after graduation. K ey w or d s: Case study, Computer security, Critical thinking, Experiential learning & education, Information assurance and security, Role-play, Security, Team projects 2 .

C A S E TE X T 2 . 1 C o m p a n y B a c k g r oun d Bank Solutions, Inc. (a pseudonym), founded in 1973 by the First Presidential Bank, a major bank of its time, is a provider of item processing servicesi to community banks, savings and loan associations, Internet banks, and small- to mid-size credit unions. It offers a full range of services, including in-clearing and Proof of Deposit (POD) processing, item capture, return and exception item processing, image archive storage and retrieval, and customer statement rendering. Bank Solutions was formed in 1973 when the Chief Operating Officer of First Presidential Bank, a major commercial bank, recognized an opportunity. Since item processing functions are standardized (they have to be in order for originating and receiving financial institutions to clear customer transactions) and scalable with increases in item processing volumes, they were able to offer these services to other financial institutions wishing to reduce operating expense and focus on growth strategies and other core business functions.

First Presidential marketed these services under the Bank Solutions brand name. Over the next 15 years, Bank Solutions enjoyed modest growth. By 1988, it served 41 small- to mid-size financial institutions. It had not, however, developed a market presence outside of the Northwestern Region of the United States, as management had hoped. This was primarily because Bank Solutions was unable to compete with other item-processing service providers that had developed proprietary software systems considered “top of the line.†To make matters worse, at the time almost one quarter of Bank Solutions‟ client base was saving and loan associations (saving and loans).

As a result of the Savings and Loan crisis, 60% of Bank Solutions‟ savings and loan customer base failed over the six years spanning 1985–1991, thus stunting the outsourcer‟s growth. The related slow down of the financial services and real estate industries and the recession of 1990–1991 presented further headwinds to the growth objectives of First Presidential management. In 1994, First Presidential sold off Bank Solutions. Under new management, Bank Solutions thrived. Keys to the company‟s renewed success included the following: · The development of key strategic partnerships with other industry participants, including data clearing houses and financial institution core processing system outsourcers.ii · The introduction of a new company culture that focused on open door management, mentoring, and enhanced employee benefits. · The development of a proprietary, state of the art item processing system that uses state-of-the-art Optical Character Recognition (OCR) technology to achieve character recognition accuracies that were previously unheard of. · The implementation of “remote capture†technologiesiii to meet electronic banking initiatives and regulations such as “Check 21.†· The upgrade or replacement of other administrative information systems, including the company‟s financial reporting system.

This helped to increase operational effectiveness and efficiencies. From 1995–2008, Bank Solutions enjoyed unprecedented growth. During that timeframe, the company expanded operations to 18 item processing facilities, two data centers in which the item processing system was hosted, and 345 financial institutions. 2 .2 C u rre n t S c e n a r io ( 2011 ) Douglas Smith, the Chief Information Officer for Bank Solutions, was one of the original members of “new management†and responsible for many of Bank Solutions‟ past successes. A solid, middle-sized company with continued growth potential, Bank Solutions has become a target for a leveraged corporate buyout.

This is an attractive situation for Douglas and other members of executive management. Several of these individuals are close to retirement; and initial indications are that the price of the buyout will be very favorable for members of executive management. The CEO and other influential members of executive management want Bank Solutions to remain an attractive purchase option and, as a result, have contracted the services of your team as an outside consultant to identify operating and regulatory risks and advise them on control measures to mitigate the risks. 2 .3 Risk A s s e s s m e n t T a s k As members of the engagement team performing the risk assessment, your team has been given the task of assessing Bank Solutions‟ incident handling, business continuity, and disaster recovery strategy.

In order to perform the assessment, preliminary interviews with Douglas Smith, the Data Center Managers, Systems Engineers and Network Architect in each of Banking Solutions‟ data centers, and the IT Managers and Day and Night Operations Managers from seven of the largest item processing facilities were conducted. Additionally, the following documentation related to Bank Solutions‟ security incident management, DR/BC planning activities was reviewed: · Flow charts that diagram the item processing operations and data flow between Bank Solutions item processing facilities and data centers and outside entities (see Appendix A) · A diagram of Bank Solutions‟ network architecture · Bank Solutions‟ Data Center Disaster Recovery and Business Continuity Plan (DRBCP) · Policies, procedures, guidelines, and standards related to security incident response · Item Processing Facility DRBCPs · Results from the most recently completed DRBCP test/exercise · Distribution list for the DRBCP · Bank Solutions‟ Backup and Recovery Policy. · Screen prints of the configurations from Bank Solutions‟ backup utility (these configurations show what server shares are subject to automated backup and the frequency of those backups) · Contracts with the off-site storage provider · A system-generated listing of access to event logging servers · A list of individuals who have been provided access to recall backup tapes from the off-site storage vendor. · Screenshots of the Intrusion Detection System (IDS), firewall, and other event logging capability configurations · Excerpts from the IDS and firewall event logs and management‟s manually maintained incident tracking log.

2 .4 F ac ts: Ri s k A s s e s s m e n t F in d i n g s Based on the discussions held with the management and a review of the documentation provided, you note the following facts: 1. With the assistance of an external consultant, Bank Solutions wrote its current data center DRBCP in 2007. It was last updated in January 2009. 2. According to Douglas, the data center DRBCP was last tested in 2007.

Testing activities consisted of a conceptual, table-top walkthrough of the DRBCP conducted by Douglas with the Data Center Managers and Network and Systems Engineers. Item processing facility DRBCPs have not yet been tested. 3. Site-specific DRBCPs have been written for the five largest item processing facilities. The remaining item processing facilities have a generic “small center†DRBCP template that was distributed to and customized by facility management in June 2010.

Four item processing facilities have not yet completed the customization exercise. 4. DRBCPs contain several sections, including the following: · Emergency/crisis response procedures · Business recovery procedures · “Return to normal†procedures · Various appendices Recovery Time Objectives and Recovery Point Objectivesiv for each critical business process and system were not identified in the DRBCP. The following details, most of which are included in the DRBCP appendices, are also documented in the text of the DRBCP: · Critical systems, including detailed hardware and software inventories · Critical business processes and process owners · Alternative processing facility addresses and directions · “Calling Trees†(notification listings) · Critical plan participant roles, responsibilities, and requirements · Critical vendor contact listings · Key business forms · Specific recovery procedures for key systems · Procedures for managing public relations and communications 5.

Based on a review of DRBCP distribution lists, it appears that not all key plan participants have a copy of the plan. When this was discussed with Douglas, he responded that copies of all DRBCPs are stored on the network (which is replicated across both data centers and via backup tape). 6. Critical plan participants have not been trained to use DRBCPs. 7.

Bank Solutions has implemented a robust host-based IDS, including detailed event logging and reporting capabilities. However, neither the DRBCP nor any other policy, standard, guideline, or procedure addresses security incident handling steps, including escalation points of contact and procedures for preserving the forensic qualities of logical evidence. 8. Event logging is also performed when power users perform specific privileged activities on production servers and selected administrative back office systems. Interestingly, it was noted that several of the same power users whose actions are recorded onto event logs also have write access to the logs themselves.

9. A review of the network diagram and conversations with the Network Architect reveal that redundancies have been implemented at the network perimeter (e.g., routers, firewalls, IDS, load balancers, etc.). 10. Banking Solutions has organized their DR/BC program according to a “sister center†format; that is, each data center serves as the other‟s “hot site†processing location and each item processing facility has been assigned a corresponding item processing facility to serve as a backup processing location. Neither the DRBCPs nor any other documentation outline specific processing responsibilities for backup facilities.

11. On a daily basis, transaction detail and item image files from the current day‟s processing operations are uploaded from each item processing facility to their regional data center (see Appendix A). 12. At the data centers, electronic vaulting has been established whereby all e-mail, file, and application servers and databases at the data center are continuously backed up to the other data center via dual dedicated fiber optic lines. 13.

A data backup and recovery utility has been implemented in each data center and the item processing facilities. Full backups of critical data files, software programs, and configurations are performed once a week and incremental backups are performed on a daily basis Monday through Friday. 14. At one item processing facility, backup jobs have routinely failed due to unknown causes. When the topic was discussed with the IT Manager on duty, he shrugged the failures off noting that the core financial institution transaction data and images are transmitted to and archived at the Bank Solutions Data Center East on a daily basis.

15. At the item processing facilities, the management has been tasked with contracting the off-site storage of backup tapes. At one of the item processing facilities, management has contracted the bank across the street to store its backup tapes in a safety deposit box. At another item processing facility, the night Operations Manager stores the backup tapes in a safe at his home. At a third item processing center, tapes are stored in a shed at the back of the building. ii This is individual project.

As a member of an engagement team in charge of performing the incident handling, DR/BC risk assessment for Bank Solutions. you should read the case background and the facts identified in the interviews. Individual Work: For a ll of the facts/ findings, prepare a written report that lists the condition(s) that present risks to Bank Solutions as well as proposed recommendations for addressing those conditions. J ournal of Information Systems Education, Vol. 22(2) Ap p e nd ix A This case was developed solely for class discussion. While the situation described in this case is based on realistic events, the Bank Solutions is a fictional organization.

Further, the names, product/service offerings, and the names of all individuals in the case are fictional. Any resemblance to actual companies, offerings, or individuals is accidental. 122 Dalhousie University Micro 1050 Unit IMMUNOLOGY CASE STUDY: HIV Presentation: Jacob, a seven-month old infant has been suffering with diarrhea, thrush, and weight loss over the previous two months. History: Jacob was born a healthy infant. Jacob grew and developed normally during his first five months after birth.

He received routine immunization with diphtheria, pertussis, tetanus and Hib vaccine at 2, 4, and 6 months without complications. Jacob was seen on a number of occasions by the family’s doctor over the past two months. Previous blood work looked unremarkable. At today’s visit to the clinic, physical examination of Jacob revealed elevated temperature (38(C), pneumonia, a rapid heart and respiratory rate, diarrhea, a diaper rash and thrush. New blood work was ordered.

LABORATORY RESULTS IMMUNOLOGY Lymphocytes: Jacob Normal values for 7-month infant Th (CD.08 x 109/L (1.7-2.8 x 109/L) Tc (CD.0x 109/L (0.8-1.2 x 109/L) (Jacob’s levels of B lymphocytes were normal) Serum immunoglobulins : IgG 3.8 g/L (2.7-9.1 g/L) IgM 0.5 g/L (0.3-0.8 g/l) IgA 0.2 g/L (0.1-0.5 g/L) Antibody to tetanus toxoid: Absent (Present) MICROBIOLOGY Blood Cultures: Negative Negative Stool parasites Cryptosporidium Negative Oral scrapings Candida albicans Negative Case Questions 1. Why did Jacob have no microbial infections during his first five months after birth? 2. What microbe causes thrush, and where is it usually found? Why do infants often develop thrush?

Under what circumstances do adults develop thrush? 3. What medications are typically prescribed to treat thrush? 4. Which arm of the immune system usually protects us from yeast infections?

5. Why was the test for tetanus toxoid antibodies negative? 6. What is Cryptosporidium and how is it treated? 7.

What is Pneumocystis jiroveci ? What medication is generally prescribed to treat Pneumocystis jiroveci pneumonia? Noting the depressed ratio of helper-T (CD4 TH) cells/cytotoxic-T (CD8 TC) cells, the doctor ordered additional tests for HIV infection; and asked the parents to go for tests. Jacob’s results were as follows: 1. Positive for HIV-.

Viral load of HIV was 120,000 copies of HIV-RNA per ml of plasma Both parents were found to be positive for HIV-1 despite the absence of any outward signs of the infection. At the initial parental interview no risk factors for HIV infection had been identified. However, on re-questioning, the father admitted to intravenous drug use in his late teens. He also reported having had shingles soon after returning from his honeymoon a few years ago. Case Questions: 8.

What kinds of microbes are most likely to cause infection in patients with HIV? 9. What are “shinglesâ€, and what might explain their occurrence in the father’s case? 10. What is the normal course of HIV infection without anti-retroviral therapy?

CASE GOAL: Understand the role of opportunistic pathogens in causing disease in AIDS patients and understand how cell-mediated immunity typically protects against these microorganisms in immune competent individuals. Adapted from Dalhousie University’s “Family Crisis†case Case 2 - Family Crisis March 2004 CSIA 485 Project #2 Detailed Assignment Description Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization (The organization is from Project 1) Step 1 : Review the selected case study and describe at least10 issues related to security, interoperability, and operations.

Step 2 : Prioritize and articulate the selected requirements based on immediate need, security posture, complexity, resource availability, and cost. Step 3 : Identify at least 4 applicable government regulations/ standards that govern how the requirements must be met, implemented, or measured. Provide rationale for why these are applicable. Step 4 : Using NIST Special Publication 800-53 select at least 4 security controls that relate to these issues and describe how these controls enhance the security posture or facilitates the secure implementation of these requirements. The deliverable for this case study assignment will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references.

It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), or references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Paper for above instructions


Introduction


In the fast-evolving realm of the financial sector, Disaster Recovery (DR) and Business Continuity (BC) planning are critical to mitigate risks and manage potential disruptions. This report examines Bank Solutions, a fictional organization, which provides item processing services and is undergoing a risk assessment of its DR and BC protocols. Several conditions present risks, which can significantly affect operational integrity and client trust. This paper will identify these risks, prioritize recommended actions based on urgency and complexity, and discuss government regulations and NIST security controls relevant to the identified issues.

Identified Risks and Findings


1. Outdated DR/BC Plan: The current Data Center Disaster Recovery and Business Continuity Plan (DRBCP) has not been updated since January 2009, which is concerning given the rapid changes in technology and regulatory environments (Camara et al., 2011).
2. Lack of Testing: The DRBCP has only undergone a conceptual, tabletop walkthrough in 2007, while the item processing facility DRBCPs remain untested. Regular testing is vital for identifying potential gaps (Mansour et al., 2019).
3. Untrained Personnel: Critical plan participants have not been adequately trained to utilize the DRBCPs. This lack of training can lead to confusion and mistakes during an actual crisis (Mulekar & Gokulakannan, 2015).
4. Generic DRBCP Templates: Some item processing facilities rely on a generic “small center” DRBCP template, which lacks facility-specific details that could be crucial during an incident (Smith, 2015).
5. Insecure Backup Storage: Backup tapes are stored in various unsecured locations, including a private home and a back shed. This poses a serious risk of data loss or theft (Louis, 2020).
6. Failed Backup Jobs: Routine backup failures at one item processing facility indicate inadequate monitoring of backup processes, risking data integrity (Geng et al., 2020).
7. Absence of Critical Objectives: The DRBCP fails to specify Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs), essential metrics for an effective DR strategy (Fitzgerald et al., 2018).
8. Inadequate Security Incident Handling: Existing policies inadequately address incident handling steps, including procedures for preserving the forensic integrity of evidence, and the segregation of duties for sensitive data access (NIST, 2018).
9. Ineffective Communication: It appears not all key individuals have access to the DRBCPs, and communication protocols during a crisis are not well-defined (Cascio, 2019).
10. Network Architecture Redundancy: While redundancy is present at the network level, specific processing roles and responsibilities for backup facilities are not defined. This could lead to operational confusion (Verma & Peha, 2017).

Recommendations


1. Update the DRBCP: Conduct an immediate review and update of the DRBCP to reflect current operational realities and emerging threats.
2. Conduct Regular Testing: Establish a cyclical testing plan for DRBCPs at both data center and facility levels. Incorporate tabletop and full-scale drills to evaluate readiness.
3. Implement Mandatory Training: Develop a structured training program for all critical plan participants to familiarize them with the DRBCPs.
4. Customize DRBCPs: Customize DRBCPs for each item processing facility with specific details tailored to their configurations and operational procedures.
5. Secure Backup Protocols: Amend policies to ensure that backup tapes are stored in secure locations. Consider utilizing offsite storage facilities that specialize in secure data management.
6. Monitor Backup Success: Implement monitoring tools and regular audits to catch backup failures proactively.
7. Define RTOs and RPOs: Establish measurable RTOs and RPOs for all critical business processes to guide the DRBCP during incidents.
8. Enhance Incident Handling Policies: Revise policies to clearly define incident handling steps, roles, and forensic preservation protocols.
9. Improve Communication Plans: Confirm all key personnel have access to updated DRBCPs and establish a clear communication protocol for crisis situations.
10. Clarify Roles at Backup Facilities: Document and clarify processing responsibilities for backup facilities to avoid ambiguity during recovery efforts.

Government Regulations and Standards


1. Gramm-Leach-Bliley Act (GLBA): Mandates financial institutions to protect customer data through appropriate security measures (Giovanni, 2018).
2. Federal Information Security Management Act (FISMA): Establishes a framework for securing government information and requires regular assessments of security programs (NIST, 2018).
3. Health Insurance Portability and Accountability Act (HIPAA): While primarily aimed at healthcare, it highlights the importance of safeguarding personal information, applicable for financial institutions handling sensitive customer data (McGraw, 2019).
4. Payment Card Industry Data Security Standards (PCI DSS): Sets requirements for organizations that handle credit card information to enhance security and prevent data breaches (PCI Security Standards Council, 2020).

Selected NIST SP 800-53 Security Controls


1. CP-2: Contingency Plan: Updating and documenting comprehensive plans will enhance organizational preparedness, ensuring quick recovery from incidents.
2. AT-2: Security Awareness Training: Mandatory training for personnel involved in DR/BC will enhance their knowledge of disaster procedures, reducing confusion during incidents.
3. CM-2: Baseline Configuration: Documenting hardware and software configurations will ensure all systems are protected and able to recover from outages effectively.
4. IR-1: Incident Response Policy and Procedures: Developing a structured incident response plan will facilitate timely and effective responses to security incidents.

Conclusion


The evaluation of Bank Solutions reveals multiple conditions that present significant risks to its disaster recovery and business continuity posture. Immediate action is necessary to address these weaknesses through updates to policies, enhanced training, and compliance with regulatory standards. By implementing the recommended actions and adhering to NIST controls, Bank Solutions can strengthen its operational resilience and safeguard its critical services.

References


Camara, S., Crossler, R., & Midha, V. (2011). Disaster Recovery and Business Continuity: A Case Study for CSIA 485. Journal of Information Systems Education, 22(2), 117-124.
Cascio, M. (2019). Communication in crisis management: A review of the importance of effective stakeholder engagement. Journal of Communication Management, 23(3), 303-320.
Fitzgerald, J. & Whelan, S. (2018). Disaster recovery planning: the role of Recovery Time Objectives (RTOs). International Journal of Business Continuity and Risk Management, 9(3), 251-263.
Geng, Q., Law, W. H. & Lai, K. H. (2020). A comprehensive review of backup processes and strategies for disaster recovery in cloud environments. IEEE Transactions on Services Computing, 13(2), 233-246.
Giovanni, M. (2018). The Importance of the Gramm-Leach-Bliley Act in Modern Banking. Journal of Financial Regulation and Compliance, 26(4), 372-386.
Louis, L. (2020). Securing the backup process: Strategies for effective data protection. Business Continuity Management Journal, 5(1), 20-30.
Mansour, R., Alfarra, D. & Moustafa, M. (2019). DR/BC best practices to minimize business interruptions: A literature review. International Journal of Information Systems and Change Management, 10(4), 317-336.
McGraw, D. (2019). HIPAA compliance and the financial sector: Are current data protection measures enough? Journal of Financial Crime, 26(2), 450-464.
NIST. (2018). NIST Special Publication 800-53: Security and Privacy Controls for Information Systems and Organizations. U.S. Department of Commerce.
PCI Security Standards Council. (2020). Payment Card Industry Data Security Standards. Retrieved from https://www.pcisecuritystandards.org/
Verma, R. & Peha, J. (2017). Network architecture and redundancy: Impact on business continuity. IEEE Journal on Selected Areas in Communications, 35(7), 1439-1449.