Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Recolector de Cienci...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
versions View all 3 versions
addClaim

Plan de contingencia TI

Authors: Segarra Sanchez, Ferran;

Plan de contingencia TI

Abstract

This document provides guidelines for the development of an IT Contingency Plan. An IT Contingency Plan is an increasingly important factor to consider when defining the strategies of IT departments of any organization because of the many threats to which information faces. Cyber-attacks, viruses, power failure, human error, fire, wilful attacks ... and a lot of threats that can cause a serious impact on the normal operation of an organization. The purpose of this project is to give a theoretical overview of the issues involved in the development of an IT Contingency Plan and to provide examples of a real project. Along the project, it has been conducted interviews with the key personnel from the different Business Units of the Organization in order to obtain the necessary information about critical business processes as part of the BIA. In addition, with the IT department it has been identified the key assets and their dependency trees, as a part of the Risk Analysis. The methodology employed in this part has been MAGERIT and the EAR / PILAR tool to perform the risk analysis, as it comes configured according to MAGERIT. Finally, security projects have been developed in order to reduce the risk level of the Organization. The results obtained from the IT Contingency Plan are mainly to identify the critical processes and the threats that can impact seriously in the organization in order to protect assets and have an adequate level of protection. As part of this project, it has been included examples of an IT Contingency Plan performed for a real company.

Country
Spain
Keywords

Contingencia, Seguretat, :Enginyeria de la telecomunicació [Àrees temàtiques de la UPC], Àrees temàtiques de la UPC::Enginyeria de la telecomunicació, Seguridad

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
    OpenAIRE UsageCounts
    Usage byUsageCounts
    visibility views 42
  • 42
    views
    Powered byOpenAIRE UsageCounts
Powered by OpenAIRE graph
Found an issue? Give us feedback
visibility
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
views
OpenAIRE UsageCountsViews provided by UsageCounts
0
Average
Average
Average
42
Green