Preview

Back Up and Recovery Policy

Good Essays
Open Document
Open Document
986 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Back Up and Recovery Policy
Backup and Recovery Policy

Purpose
Information Security is vital for any company or organization. Thus, it is very much essential to constantly secure and protect IT assets and information which is likely the company’s most prized asset.

Description
This document provides a structured approach to prepare DOMEIGHN Company in the event of disruptions which may affect the whole network services due to factors beyond our control (ex. natural disasters or man-made events). The Plan would also guide restoration of network integrity and normal operations of the network the fastest possible when an incident occurs.

Objectives * Serves as a guide for Domeighn’s IT data, Internet, and network recovery * Provides procedures and resources needed to assist in network recovery * Identifies persons that must be notified in the event of a network failure * Documents storage, safeguarding and retrieval procedures for vital network records and other relevant data

Backup Environment
As a backup to Domeighn Company’s critical files, a dedicated Openfiler Network Attached Storage (NAS) is used and is connected to the Windows Server 2003. The server then is catering the domain network’s file sharing, enabling users to have their important documents saved in their individual mapped network drive which appears like a local drive but is actually the drive (NAS) situated in the server. In this way, user files are much safer in an instance of accidental erasures and backup of files would be easier since the network only has to backup the server drive as for all data were already saved in there.

The backup method implemented for the NAS would be a RAID 10 (RAID 1 + 0; data is written in stripes across primary disks that have been mirrored to the secondary disks) so as to have redundancy or fault tolerance all over the network ensuring uptime and reliability of the network’s important data and/or services in case of a hard drive failure.

Disaster Recovery Plan

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Network Attached Storage (NAS) is a type of file-level storage device which is dedicated and designed to provide users with fast and secure access to their data at all times over LAN and Ethernet connections. NAS’s are normally a specialized computer built to store and serve files quickly. The Capacity for NAS’s is limitless. Low end Network Attached Storage units start at around $300 and can store over 5 Terabytes. The Picture on the right is of a Netgear ReadyNAS 312 RN31200 and can hold 8TB.…

    • 291 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    INDP Final Project

    • 3551 Words
    • 12 Pages

    connected by a 4 gigabit fiber link to a 10 terabyte Network Area Storage (NAS) device. The…

    • 3551 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    The storage of NAS systems can vary greatly. There are consumer models with a fixed amount of storage, and then the professional versions that have the capacity of many terabytes that can be upgraded when new drives become available (Waring 2007). With the numerous amount of drives the chance of corrupted data and errors is always a possibility. With this possibility manufacturers have included the ability to arrange the drive into a RAID. The different RAID configurations allow users the protection from errors and data loss at the expense of storage space.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    We already know that the storage device will have to be nonvolatile, keeping the data intact through power outages or reboots to the system. There should be a backup of all the data on a secondary storage device in the event that the primary storage device fails. Since most of the employees will have be able to access the same files on this system, file locks need to be implemented.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Newer NAS devices consists of one or more hard disks that are implemented by RAID hardware, this increases performance, capacity and fault tolerance.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Research Paper

    • 334 Words
    • 3 Pages

    You will be able to explain what a NAS device is, its communication speed, capacity, and its…

    • 334 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Users would like to use a NSA if multiple computers are involved and many files are needed to be shared. It is also can enable a simpler and lower cost system such as load-balancing and fault tolerant email and web server systems.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    homework7

    • 1639 Words
    • 7 Pages

    2. Data need to be back up in order to avoid to loss documentation together.…

    • 1639 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    There are a lot of ways of backing store now that is on the market for a PC user, magnetic and optical and pen drive and…

    • 447 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays