Preview

Back Up and Recovery Policy

Good Essays
Open Document
Open Document
986 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Back Up and Recovery Policy
Backup and Recovery Policy

Purpose
Information Security is vital for any company or organization. Thus, it is very much essential to constantly secure and protect IT assets and information which is likely the company’s most prized asset.

Description
This document provides a structured approach to prepare DOMEIGHN Company in the event of disruptions which may affect the whole network services due to factors beyond our control (ex. natural disasters or man-made events). The Plan would also guide restoration of network integrity and normal operations of the network the fastest possible when an incident occurs.

Objectives * Serves as a guide for Domeighn’s IT data, Internet, and network recovery * Provides procedures and resources needed to assist in network recovery * Identifies persons that must be notified in the event of a network failure * Documents storage, safeguarding and retrieval procedures for vital network records and other relevant data

Backup Environment
As a backup to Domeighn Company’s critical files, a dedicated Openfiler Network Attached Storage (NAS) is used and is connected to the Windows Server 2003. The server then is catering the domain network’s file sharing, enabling users to have their important documents saved in their individual mapped network drive which appears like a local drive but is actually the drive (NAS) situated in the server. In this way, user files are much safer in an instance of accidental erasures and backup of files would be easier since the network only has to backup the server drive as for all data were already saved in there.

The backup method implemented for the NAS would be a RAID 10 (RAID 1 + 0; data is written in stripes across primary disks that have been mirrored to the secondary disks) so as to have redundancy or fault tolerance all over the network ensuring uptime and reliability of the network’s important data and/or services in case of a hard drive failure.

Disaster Recovery Plan

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Network Attached Storage (NAS) is a type of file-level storage device which is dedicated and designed to provide users with fast and secure access to their data at all times over LAN and Ethernet connections. NAS’s are normally a specialized computer built to store and serve files quickly. The Capacity for NAS’s is limitless. Low end Network Attached Storage units start at around $300 and can store over 5 Terabytes. The Picture on the right is of a Netgear ReadyNAS 312 RN31200 and can hold 8TB.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    connected by a 4 gigabit fiber link to a 10 terabyte Network Area Storage (NAS) device. The…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Network attached storage (NAS) is basically a server that acts as hard drive that’s attached to a network (Johnson). This connection to a network allows anyone who is also connected to the network the ability to access the hard drive. The NAS come in many sizes and different capabilities. The network connection that the NAS uses can be almost any that are available. The standard Ethernet connection is the most common connection by there are also systems that use a wireless connection or even a fiber optic connection for extremely fast transfer speeds.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is my belief that with these precautions in place as well as adequate storage we can develop a file system that meets all of our requirements. Projects can be worked on offsite. The unique feature about using UNIX is that files can be updated or modified in real time allowing members to access those changes. Simply put file sharing allows us to be flexible and work more…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A Network-attached storage (NAS) devices store and share data for multiple computers, whether they’re Macs or PCs, and you can access that data when you’re sitting in the same room with the network or securely when you’re on the go, over the Internet.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Research Paper

    • 334 Words
    • 3 Pages

    You will be able to explain what a NAS device is, its communication speed, capacity, and its…

    • 334 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Users would like to use a NSA if multiple computers are involved and many files are needed to be shared. It is also can enable a simpler and lower cost system such as load-balancing and fault tolerant email and web server systems.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework7

    • 1639 Words
    • 7 Pages

    2. Data need to be back up in order to avoid to loss documentation together.…

    • 1639 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    There are a lot of ways of backing store now that is on the market for a PC user, magnetic and optical and pen drive and…

    • 447 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays