<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Tutorial activities</title>
    <link>https://moodle.uwtsd.ac.uk/mod/forum/view.php?f=27139</link>
    <description>Tutorial activities</description>
    <generator>Moodle</generator>
    <language>en</language>
    <copyright>(c) 2026 UWTSD Moodle</copyright>
    <image>
      <url>https://moodle.uwtsd.ac.uk/theme/image.php/learnr/core/1765381289/i/rsssitelogo</url>
      <title>moodle</title>
      <link>https://moodle.uwtsd.ac.uk</link>
      <width>140</width>
      <height>35</height>
    </image>
    <item>
      <title>Re: Week 6 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222423</link>
      <pubDate>Tue, 17 Mar 2026 16:45:26 GMT</pubDate>
      <description>by Md Monsuruzzaman. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;&lt;a class=&quot;autolink&quot; title=&quot;Week 6 Tutorial activity&quot; href=&quot;https://moodle.uwtsd.ac.uk/mod/resource/view.php?id=658413&quot;&gt;Week 6 Tutorial Activity&lt;/a&gt; - Creating a Contingency Plan&lt;br /&gt;
Scenario: Daraz (E-Commerce Platform)&lt;br /&gt;
&lt;br /&gt;
Team Members: MD Monsuruzzaman – 2504658, MD Hasibul Islam – 2421865, Naveed Ullah Shah – 2510665&lt;br /&gt;
&lt;br /&gt;
1. Analysis of Scenario&lt;br /&gt;
-Potential Disasters / Events&lt;br /&gt;
Fire, Flood, Power outage&lt;br /&gt;
Cyberattacks, Data breaches, Insider threats, System failures&lt;br /&gt;
&lt;br /&gt;
-Critical Business Functions and Assets&lt;br /&gt;
Website &amp;amp; mobile app&lt;br /&gt;
Payment system&lt;br /&gt;
Customer database&lt;br /&gt;
Order system&lt;br /&gt;
IT infrastructure&lt;br /&gt;
&lt;br /&gt;
2. Business Continuity Plan (BCP)&lt;br /&gt;
-BC Team&lt;br /&gt;
Role                                     Responsibility&lt;br /&gt;
BC Manager                        Coordination&lt;br /&gt;
IT Team                               System recovery&lt;br /&gt;
Security Team                     Data protection&lt;br /&gt;
Operations                         Business process&lt;br /&gt;
Communication                 Customer updates&lt;br /&gt;
&lt;br /&gt;
-Strategies&lt;br /&gt;
Hot site (recommended)&lt;br /&gt;
Cloud backup&lt;br /&gt;
Third-party recovery&lt;br /&gt;
&lt;br /&gt;
-Policy &amp;amp; Maintenance&lt;br /&gt;
Purpose, Scope, Roles&lt;br /&gt;
Training programs&lt;br /&gt;
Regular testing and updates&lt;br /&gt;
&lt;br /&gt;
3. Disaster Recovery Plan (DRP)&lt;br /&gt;
-Disaster Types&lt;br /&gt;
Natural: Fire, Flood&lt;br /&gt;
Man-made: Cyberattack, Data breach&lt;br /&gt;
&lt;br /&gt;
-Recovery Steps&lt;br /&gt;
Identify systems&lt;br /&gt;
Activate team&lt;br /&gt;
Restore backup&lt;br /&gt;
Fix issues&lt;br /&gt;
Resume operations&lt;br /&gt;
&lt;br /&gt;
-DR Team&lt;br /&gt;
Role                             Responsibility&lt;br /&gt;
DR Manager                Lead&lt;br /&gt;
IT Team                        Restore systems&lt;br /&gt;
Network                       Connectivity&lt;br /&gt;
Security                        Remove threats&lt;br /&gt;
&lt;br /&gt;
-Testing&lt;br /&gt;
Simulation&lt;br /&gt;
Drills&lt;br /&gt;
Desk checks&lt;br /&gt;
&lt;br /&gt;
4. Conclusion&lt;br /&gt;
Daraz must use BCP and DRP to ensure quick recovery, reduce risk, and maintain business&lt;br /&gt;
continuity.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222423</guid>
    </item>
    <item>
      <title>Week 6 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222421</link>
      <pubDate>Tue, 17 Mar 2026 16:20:52 GMT</pubDate>
      <description>by Ayman El Hajjar. &amp;nbsp;&lt;p&gt;&lt;p&gt;Week 6 activity&lt;/p&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134994&amp;parent=222421</guid>
    </item>
    <item>
      <title>Re: Week 5 activity</title>
      <link>https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134510&amp;parent=221862</link>
      <pubDate>Tue, 10 Mar 2026 16:49:54 GMT</pubDate>
      <description>by Hrachya Yeghikyan. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;1.Hrachya Yeghikyan,  (2526551)&lt;br /&gt;
2. Mahedi Hasan Rabbi. (2517228)&lt;br /&gt;
3. Khadija Banu, (2527944)&lt;br /&gt;
4. Md Arafat Rahman, (2437469)&lt;br /&gt;
&lt;br /&gt;
(B scenario for (TechTraders Ecommerce Ltd.)&lt;br /&gt;
&lt;br /&gt;
(The ISO 27000 series) is a standard method for guaranteeing the security of any kind of organization or platform on a standard level. As for (TechTraders Ecommerce ltd), online platforms like that face increasing numbers of cyber threats. (The ISO 27000 series) is highly effective when it comes to getting rid of standard security risks, however being the standard, hence known it is more identifiable for cyber-attackers and hackers, due to being a more popular method, hence, on the surface-level effective.&lt;br /&gt;
&lt;br /&gt;
(NIST Security models) concentrate on the usefulness of the platform for low-income people or those wishing to purchase products for low prices, alas low prices come with their pricing. It is vital to be responsible for the quality of the product and the safety of it, some may even be stolen, especially in online shopping when it comes to( Techtraders ecommerce ltd.)&lt;br /&gt;
&lt;br /&gt;
(The Principle of Least Privilege) may be applied, depending on a variety of issues, such as security-related issues and cost-related issues. When it comes to online shopping, such as (TechTraders Ecommerce Ltd.) it becomes even more complex, as the maintenance of minimum advantages to the pricing becomes even more problematic and the security issues, even more prevalent, as online threats and cyberattacks, may break the maneuvering required for overcoming the limitations on privileges.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.uwtsd.ac.uk/mod/forum/discuss.php?d=134510&amp;parent=221862</guid>
    </item>
  </channel>
</rss>