Disaster Recovery Plan

Topics: Business continuity planning, Disaster recovery, Backup Pages: 2 (526 words) Published: March 13, 2013
Furthermore, there are unfortunately multiple situations that may be man-made rather than Mother Nature. These include things such as strikes, work stoppages, sabotage, burglary, or any type of hostile activity.

Considering that The Bloom Design Group is now using a WAN system to coordinate its business processes, an appropriate disaster recover plan will include having an alternate site to step in, in the event of an emergency. This will include an outside vendor who will provide backup services in the event that the programs at The Bloom Design Group fail for one reason or another. In the interest of financial feasibility, The Group should contract for a warm site to step in if the home networks are compromised.

3 Disaster Recovery Test Plan

For each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan.

1 Walk-throughs

The first assessment of the plan would be to implement a supervised walk-through of the test. By conducting this test it will present any added material regarding any additional processes that may need to be added, adjustments in measures that are not sufficient, and additional pertinent changes. The policy has to be amended to legitimate any issues found during the test. The first test run would be best completed in fractions and when less activity is being completed to lessen interruptions to the inclusive operations of the organization. This is an excellent option to include in The Bloom Design Group disaster recovery plan (DRP).

2 Simulations

This is a situation where a mockup is created to closely simulate an attack or other danger (Merkow, 2006). This will mimic the response to emergency as closely as possible. This is an excellent option to include in The Bloom Design Group disaster recovery plan (DRP).

3 Checklists

In this situation, the members of The Bloom Design Group...

References: Cite all your references by adding the pertinent information to this section by following this example.
Merkow, M. & Breithaupt, J. (2006), Information security: Principles and Practices. Upper Saddle River, NJ: Pearson/Prentice Hall
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Disaster Recovery Plan Essay
  • It/244 Disaster Recovery Plan "Appendix D" Essay
  • Disaster Recovery Plan Essay
  • Essay about Business Continuity and Disaster Recovery
  • Disaster Recovery Planning Essay
  • LPHG Disaster Recovery Scenario Essay
  • Essay about The Importance of Business Continuity & Disaster Recovery: Telecommunications Infrastructure

Become a StudyMode Member

Sign Up - It's Free