Preview

Disaster Recovery Plan

Better Essays
Open Document
Open Document
1349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Disaster Recovery Plan
Disaster Recovery Plan

David Bartmess

IT/240

Tim Ramsdell

Disaster Recovery Plan

This plan is intended to protect and recover company computer-based assets in the case of loss or damage to the existing systems. To be included in this plan are the backup plans, system protection, and recovery procedures. The theft of the server physical entity needs to be addressed first, since the physical loss of equipment cannot be totally compensated for. Having a window in the server room needs to be addressed, either by closing up the wall and eliminating the window, or by using more physical deterrents such as bars on the window that cannot be removed. Physical security is first and foremost a priority. If the physical layout of the room cannot be changed, the servers and other equipment vital to the company’s continuing efforts should be moved to an inside room with a door that can be protected with an entry lock system. The servers themselves need to be protected as well, by either attaching locking mechanisms to the server cases, or locking the server racks to prevent easy theft. Backups need to be done on a more frequent basis than once a month. Although the backup is being done to an exterior drive, the backups should be done on removable media, so that they can be carried offsite and stored in a secure place, so that subsequent thefts of equipment and/or natural disasters do not compromise the backups. Incremental backups should be done nightly, with a full backup done each Sunday, and the backup media taken to a secure offsite location such as a bank vault or dedicated storage facility. In the case of the possibility of flooding, whether it be from human causes or natural disasters, the servers should be located at high ground, or high enough to escape primary damage from the water. If the servers cannot be placed in a second-floor facility, place the servers in the server rack from the highest rack point down, to try to



References: What is a server cluster? (2003, March 28). Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/cc785197(v=ws.10).aspx ASK.Com Wiki (RAID). (2013). Retrieved from ASK.com: http://www.ask.com/wiki/RAID#Scenarios_other_than_disk_failure Yager, T. (1999, April). RAID! Retrieved from ProQuest: http://search.proquest.com.ezproxy.apollolibrary.com/docview/237181720

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * The rotation should be done every day due to the constant change of user profiles and the fact that new material is always being added to keep games up to date. Full backups should be done weekly with differential backups done daily. The full backup should be done at the start of every week at the lowest peak of online use and the next 6 days done with differential.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 2

    • 208 Words
    • 1 Page

    An important part of this phase is creating a password policy that would enforce complex passwords. This helps protect your network from unauthorized access. Adding a physical security measure will also help with the security of your network. Locking the physical door to the data center will help protect someone from physically accessing the network. Another important step would be to perform daily backups of the servers. In the event of a system failure or disaster, you can restore most of the data to its most recent state.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    JIT2 Risk Management

    • 2004 Words
    • 9 Pages

    The goal is to minimize the impact of any disruption by containing it within a predictable and predetermined period of time. To do this, I recommend that this plan be developed and implemented with as many preventative controls, contingency resources, and procedures designed to allow the organization to quicky bounce back from any long-term business interruption. With this document I’ll present a workable DR plan that focuses not only on safeguarding critical data but also on the restoration of all normal business functions.…

    • 2004 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Disaster Plan It

    • 1313 Words
    • 6 Pages

    123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server.…

    • 1313 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    continuity plan overview

    • 689 Words
    • 3 Pages

    In this writing I will be presenting the main duties for the Business Continuity Lead/Manager position. I feel this position is one that is of great importance, particularly in dealing with the sensitive healthcare information and systems that you all use on a daily basis. This position gives you at least some insurance that if something were to happen your company would not be lost or have a great deal of downtime from providing your essential services to your clients. I will begin by describing some of the task that are requirements of this position.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    A disaster recovery plan is a plan to restore a critical business process or system to operation after a disaster. It is invoked after a disaster such as flood, tornado and hurricane.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The key elements of a disaster recovery plan are to keep computers running, meeting all agreements between customers and suppliers, and being proactive rather than reactive. Keeping the computers and systems running is an essential element to the disaster recovery plan. The systems and computers are the link to the services they provide. The business relies on the internet for their marketing or sales needs, especially in today’s world of business. Meeting the agreements between customers and suppliers is essential because they trust your business will deliver these services. Being proactive rather than reactive is always a good thing for a business to have. The employees or personnel should already know what to do when…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6

    • 806 Words
    • 4 Pages

    A disaster recovery plan, is a plan for business continuity in the event of a disaster that destroys part or all of a business's resources, including IT equipment, data records and the physical space of an organization.…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Emergency Operation Plan

    • 4644 Words
    • 19 Pages

    Disasters, whether natural or manmade, can happen anytime and anywhere, without warning. An earthquake, hurricane, tornado, fire, or hazardous material spill or even an act of terrorism can happen anywhere any time any place. If your business, school, city, town or home and family were faced with an unexpected disaster, would you be totally prepared? A Emergency Operations Plan (EOP) defines the planned response to emergency situations associated with natural and man-made disasters, it is a response blueprint with details on vulnerability, resources, and appropriate actions to take when disaster situations strike. It is a plan that every town, city, school, factory should have incase disaster strikes (Perry & Lindell, 2007).…

    • 4644 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    It is important that we keep personal information stored securely, ensuring that confidential information is not unlawfully or inappropriately assessed. This means that we must not leave information hanging around where it may be seen by others and we must use used the lockable cabinets provided by your setting to store information safely; these cabinets should be kept behind a lockable door which should be kept locked whist not in use. We should ensure that our computers have secure passwords which are changed regularly and that and that any IT portable storage and emails are encrypted. Make sure that passwords are not shared and that you log off before letting someone else use the computer…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Disaster Recovery Plan

    • 638 Words
    • 3 Pages

    Briefly discuss the internal, external, and environmental risks, which might be likely to affect the business and result in loss of the facility, loss of life, or loss of assets. Threats could include weather, fire or chemical, earth movement, structural failure, energy, biological, or human.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    The disaster recovery plan provides a risk analyst that lists the possible threats to this company and the critical business processes that require protection. This plan also provides suggestions for preparing a backup site, and goals for getting the business back up and running.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Good Essays

    The term ‘disaster mitigation’ is variously understood by different people in different disciplines. The meaning of the word mitigate as “to mollify; to make easily borne; to temper’. Therefore one may consider mitigation action as if it will happen after the event. Various disasters like earthquake, landslides, volcanic eruptions, fires, flood and cyclones are natural hazards that kill thousands of people and destroy billions of dollars of habitat and property each year. The rapid growth of the world's population and its increased concentration often in hazardous environment has escalated both the frequency and severity of natural disasters.…

    • 329 Words
    • 2 Pages
    Good Essays

Related Topics