Preview

Week 3 - IT244 - Disaster Recovery Plan

Satisfactory Essays
Open Document
Open Document
491 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 3 - IT244 - Disaster Recovery Plan
University of Phoenix
IT/244 Intro to Security
Week 3 – Assignment – DRP – Disaster Recovery Plan
Date: 10/6/2013

Disaster Recovery Plan
I. Risk Assessment
a. Critical Business Process
a.i. The mission-critical business systems and services that must be protected by this DRP are as follows: Payroll, Human Resource Data, POS backup media, and Web Servers and their services.
b. Internal, External, and Environmental Risks
b.i. Examples of internal risks that may affect business are unauthorized access by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature.
II. Disaster Recovery Strategy
a. Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. As well as having a backup and retention site to work from, and recover from for the main servers and web services.
b. Unwanted access can be turned off, or excluded when logged in via a monitoring service, as well as time restricted login. Any unauthorized logins will be recorded and terminated as well as site information and tracing information. Security measures are implied (camera, onsite security, etc.).
III. Disaster Test Plan
a. Monthly walkthroughs of the equipment, as well as quality assurance through the electric company, Internet Service providers, will ensure upkeep of the facilities main sources of outside connection as well as power. Weekly walkthroughs from management will keep the records up to date, as well as daily walkthroughs by IT will keep day to day evaluations up to date.
b. Working with the electric company, as well as the internet service provider for the company will

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ITNW 2335

    • 402 Words
    • 2 Pages

    4. Which network support services team is responsible for testing a new customer connection and for monitoring the ongoing operation of the link?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    These procedures involve cyber security, ability planning, and recovery tolerances (Barr, 2010, p. 3). Cyber security cover a wide variety of subject matter, however the generally significant is that of determining the people who must have right of entry. Restricting the access to merely those individuals who actually require it will generally probable of lessening the danger of impending impairment to web-based systems. Different companies must not be concerned on an unexpected upsurge of users such as Facebook or EBay, accordingly their ability for storage can extend when the requirement occur. Although; in the exceptional deviations the requisite for a wider and further protected database is mandatory. Procedures and design must be ready ahead to deal with this problem if ever it occurs. Pertaining to recovery tolerance, all systems, and either it is for informational or monetary purposes must have a backup plan ready to curtail potential loss of…

    • 1099 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Complete the Disaster Recovery Plan (DRP) portion of the Information Security Policy. Include the following:…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    continuity plan overview

    • 689 Words
    • 3 Pages

    In this writing I will be presenting the main duties for the Business Continuity Lead/Manager position. I feel this position is one that is of great importance, particularly in dealing with the sensitive healthcare information and systems that you all use on a daily basis. This position gives you at least some insurance that if something were to happen your company would not be lost or have a great deal of downtime from providing your essential services to your clients. I will begin by describing some of the task that are requirements of this position.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The best way to prevent disruption by disaster is to make sure current policies are being followed so that when changes come, changes will be the same for everyone. It’s very hard to evaluate and come up with a plan for disaster if everyone is working by their own rules. Currently expectations are that the following are already taking place:…

    • 1033 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Disaster Plan

    • 1319 Words
    • 6 Pages

    My name is Emanuel and I am an IT/network consultant, I was hired The IST Department of XYZ Computers to create a disaster plan for the company. Now, the average person would think is there hurricane, title wave, or a tornado about to hit the company; if so why in the heck would the company need an informational technology/networking consultant to create a disaster plan. Well lucky for me it is not that type of disaster, however in the world of informational technology and networking computer viruses, worms, and sometimes natural disasters needs plan just like real disasters. That is why I am going to show you informational technology/networking and computer enthusiast the best way to plan for a disaster for your small/large business, and save your company thousands and possibly millions of dollars lost revenues, user salaries, and server outage costs in server downtime.…

    • 1319 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    This plan is designed to ensure the continuity of the business in the event of a natural and/or catastrophic event at any location…

    • 168 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 3110 Lab 7

    • 949 Words
    • 4 Pages

    Disaster recovery risk assessment and business impact analysis (BIA) are crucial steps in the development of a disaster recovery plan. But, we need to locate disaster recovery risk assessment and business impact assessment in the overall planning process. To do that, let us remind ourselves of the overall goals of disaster recovery planning, which are to provide strategies and procedures that can help return IT operations to an acceptable level of performance as quickly as possible following a disruptive event. The speed at which IT assets can be returned to normal or near-normal performance will impact how quickly the organization can return to business as usual or an acceptable interim state of operations.…

    • 949 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Disaster Recovery Plan

    • 1349 Words
    • 6 Pages

    This plan is intended to protect and recover company computer-based assets in the case of loss or damage to the existing systems. To be included in this plan are the backup plans, system protection, and recovery procedures.…

    • 1349 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Risks in a supply chain occur when unexpected events might disrupt the flow of materials on their journey from initial suppliers through to final customers. Internal risks appear in normal operations such as late deliveries, excess stock, poor forecasts, minor accidents, human error, faults in information technology. External risks appear from outside the chain such as earthquakes, hurricanes, wars, disease outbreaks, crime, terrorist attacks.…

    • 2743 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    According to Cherdantseva and Hilton (2013) one of the most essential facets that should be included in the risk assessment is correctly making out possible threats to the security and confidentiality of data. This should include looking around the data storage system and thinking about possible threats that were not identified before a threat occurred. Venter and Eloff (2003) say that the risk assessment should think about the activities and processes that are involved in manipulation of the data because these two facets give leeway to the compromising of data security and confidentiality. Pipkin (2000) states that the risk assessment should include reliable outside people because they cannot easily overlook the threats that are facing the security and confidentiality of data in a workplace that they are not actively involved.…

    • 1049 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Blackwell, G. (2010, May 25). Disaster Recovery For Small Business. Retrieved March 13, 2013, from Small Business Computing: http://www.smallbusinesscomputing.com/biztools/article.php/10730_3884076_2/Disaster-Recovery-For-Small-Business.htm…

    • 4593 Words
    • 19 Pages
    Best Essays
  • Good Essays

    After the Second World War the managerial formalism was still the dominant view of organization and management. The previous management theories which were dominating the view of the organizations and management that created by the classical management theorists, such as Weber 's bureaucracy and Taylor 's scientific management.…

    • 2008 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Ict Disaster Recovery Plan

    • 2478 Words
    • 10 Pages

    |Title | | | |ICT Disaster Recovery Plan | | |Date issued | | | |2 | |Version | | | | | |Review date | | | | | | |Ratified by | | |AMENDMENTS RECORD | |DATE |PAGE |COMMENTS | | | | | | | | |…

    • 2478 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Disaster Management Viii

    • 352 Words
    • 2 Pages

    ‘Shiksha Kendra’, 2, Community Centre Preet Vihar, Delhi – 110092, India Tel : 91-011-22509252-57/59, Fax : 91-011-22515826 E-mail : cbsedli@nda.vsnl.net.in Website : www.cbse.nic.in…

    • 352 Words
    • 2 Pages
    Satisfactory Essays