Preview

It/244 Appendix D Essay Example

Satisfactory Essays
Open Document
Open Document
656 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It/244 Appendix D Essay Example
Associate Level Material
Appendix D

Disaster Recovery Plan

Student Name: Christopher McCleary

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Mr. Romel Rausa Llarena

Date: 4/15/12

Disaster Recovery Plan

Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.

1 Risk Assessment

1 Critical business processes

List the mission-critical business systems and services that must be protected by the DRP.

Company 1: The Bloom Design Group - The mission critical business systems and services that must be protected would be the customer, suppliers, and business information, credit card or banking information made for purchases of paint and other supplies. Business database systems also must be protected. All the company and Website applications must also be protected under the DRP.

2 Internal, external, and environmental risks

Briefly discuss the internal, external, and environmental risks, which might be likely to affect the business and result in loss of the facility, loss of life, or loss of assets. Threats could include weather, fire or chemical, earth movement, structural failure, energy, biological, or human.

The risks that could be involved are natural disasters such as Earthquakes, structural failure, fires, extreme weather creating floods or blizzard like conditions, and loss of power or shortage.

2 Disaster Recovery Strategy

Of the strategies of shared-site agreements, alternate sites, hot sites, cold sites, and warm sites, identify which of these recovery strategies is most appropriate for your selected scenario and why.

The DRP strategy that would best fit the Bloom Design Group would be the shared-site agreements because this offers this small company an additional place to store

You May Also Find These Documents Helpful

  • Good Essays

    Read questions 80 and 81 on pp. 274-275 of the text. Identify the problems with the TCP/IP network in each scenario and complete the table. Explain your answer for each of the scenarios.…

    • 328 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Earthquakes can damage buildings by the shaking itself or by the ground beneath them settling to a different level than it was before the earthquake. This must be the first vulnerability that we will address for this category. A serious earthquake can destroy the building, produce flooding, and cause fire, etc… This will end client services within the building until the damage has been addressed. A fire can cause severe damage to the facility and equipment halting services provided to the clients. Tornados, floods, landslides, and hurricanes have the ability to damage the facility and equipment which would cause an inability for employees to perform their jobs and cause a disruption to the services provided to the…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Directions: Assume that you are on the school board of your school district and you are tasked with the job of strategic planning for issues facing your district. Complete the matrix below to determine the potential response of each of the religious groups in your community. Use the attached links to research the basic moral and ethical principles believed by each group. Then determine how you believe each group will react to the issue based on what you find. Provide a brief justification for your answer. After completing the matrix, write a 300- to 500-word summary of the significant similarities and differences among the different religious groups.…

    • 1333 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    company FACILITIES and within each facility decisions have to be made in regard to the most appropriate process…

    • 2846 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    NASA Request for Proposal

    • 1042 Words
    • 4 Pages

    Only the required minimum amount of information is requested to provide for proper evaluation. Efforts should be made to keep offers as brief as possible, concentrating on substantial information which is essential for proper evaluation. Offers shall not exceed 25 pages, see III.7 of the RFP. The offeror must complete and submit the enclosed Representative Task Orders (RTOs), Exhibit B of the RFP. Within 30 days after award of this procurement, the successful offeror must submit their Information Technology Security Plan for NASA's approval. This plan must be consistent with and provide further detail of the approach contained in the offeror's quote that resulted in the award of this order and in compliance with the requirements stated in the NFS 1852.204-76 Security Requirements for Unclassified Information Technology Resources. The plan, as approved by the Contracting Officer, shall be incorporated into the contract as a compliance document.…

    • 1042 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Environmental risks that could affect the business are obviously major storms, floods, tornados, etc. A tornado could knock out the internet and prevent Sunica Music and Movies from accessing their databases for either inventory or accounting purposes which would make running the business virtually impossible. External Risks to Sunica Music and Movies could be a struggling economy or competitor sabotage. These tend to be factors that are out of the businesses control and depend on an outside source to create them. Internal risks are things like a worker strike or employee sabotage. These are problems that are generated within the organization. A…

    • 914 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Business Impact Analysis

    • 1075 Words
    • 5 Pages

    In this analysis account, the researcher is going to discuss and subsequently describe methods for establishing components priorities by determining components dependencies and reliance in both business continuity and disaster recovery.…

    • 1075 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Business continuity planning and disaster recovery capability will become compulsory for all healthcare business for the first time in the United States healthcare industry. The health insurance portability and accountability act (HIPAA) that was passed by the United States congress in 1996 has a part of its phased implementation "Security Guidelines," which refers to information security. This section dictates that all healthcare organizations who use healthcare data must meet the terms of business continuity and data security standards within two years. The final guideline on this subject was published late 2000 in the federal register. The implementation of the said security guidelines in business continuity requirement is expected from as early as 2001. The strategic goal of this legislative mandate is to reduce the cost in the healthcare area by standardizing data processing. This has been done as an introduction to founding a centralized clearing-house for processing claims, almost the same as the financial industry. Business continuity management is important for healthcare organizations since they could be in situations where their normal operations have been compromised concurrently with an increase in the community’s demand for their services.…

    • 997 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    MU1 Assignment 2

    • 1726 Words
    • 6 Pages

    Along with the production process, other areas can be identified as posing risks; distribution, finance, human…

    • 1726 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Intro –What is a hazard? - Human and Physical Factors – How to manage with events…

    • 958 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ffffffffffffffffffff

    • 3829 Words
    • 16 Pages

    Wold H. Geoffrey., 1997 Disaster Recovery Planning Process [online] Available from: http://www.drj.com/new2dr/w2_002.htm, [last accessed on 3rd march 2011]…

    • 3829 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    Fire is another seismic hazard. It can flare up from broken gas and power lines, or from overturned wood, coal, or gas stoves.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss.…

    • 1740 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Audit Sistem Informasi

    • 337 Words
    • 2 Pages

    4. There are some types of recovery site. Which type has a basic advantage that can supplement damaged facilities at original site ?…

    • 337 Words
    • 2 Pages
    Satisfactory Essays