Preview

Disaster Recovery Plan

Better Essays
Open Document
Open Document
1349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Disaster Recovery Plan
Disaster Recovery Plan

David Bartmess

IT/240

Tim Ramsdell

Disaster Recovery Plan

This plan is intended to protect and recover company computer-based assets in the case of loss or damage to the existing systems. To be included in this plan are the backup plans, system protection, and recovery procedures. The theft of the server physical entity needs to be addressed first, since the physical loss of equipment cannot be totally compensated for. Having a window in the server room needs to be addressed, either by closing up the wall and eliminating the window, or by using more physical deterrents such as bars on the window that cannot be removed. Physical security is first and foremost a priority. If the physical layout of the room cannot be changed, the servers and other equipment vital to the company’s continuing efforts should be moved to an inside room with a door that can be protected with an entry lock system. The servers themselves need to be protected as well, by either attaching locking mechanisms to the server cases, or locking the server racks to prevent easy theft. Backups need to be done on a more frequent basis than once a month. Although the backup is being done to an exterior drive, the backups should be done on removable media, so that they can be carried offsite and stored in a secure place, so that subsequent thefts of equipment and/or natural disasters do not compromise the backups. Incremental backups should be done nightly, with a full backup done each Sunday, and the backup media taken to a secure offsite location such as a bank vault or dedicated storage facility. In the case of the possibility of flooding, whether it be from human causes or natural disasters, the servers should be located at high ground, or high enough to escape primary damage from the water. If the servers cannot be placed in a second-floor facility, place the servers in the server rack from the highest rack point down, to try to



References: What is a server cluster? (2003, March 28). Retrieved from Microsoft TechNet: http://technet.microsoft.com/en-us/library/cc785197(v=ws.10).aspx ASK.Com Wiki (RAID). (2013). Retrieved from ASK.com: http://www.ask.com/wiki/RAID#Scenarios_other_than_disk_failure Yager, T. (1999, April). RAID! Retrieved from ProQuest: http://search.proquest.com.ezproxy.apollolibrary.com/docview/237181720

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Common buisness best practice daily incremental backup, a weekly full backup, and once a month you make a special backup that is kept in storage.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 344 Words
    • 2 Pages

    * Since the company exists only online restore time would be long due to the need to reload all gaming apps and user profiles. Contingency plan must be drawn up for all possibilities. Compile a list of all eventualities then create procedures to recover the data. All procedures are to be tested to make sure they work.…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Assignment 2

    • 208 Words
    • 1 Page

    An important part of this phase is creating a password policy that would enforce complex passwords. This helps protect your network from unauthorized access. Adding a physical security measure will also help with the security of your network. Locking the physical door to the data center will help protect someone from physically accessing the network. Another important step would be to perform daily backups of the servers. In the event of a system failure or disaster, you can restore most of the data to its most recent state.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Complete the Disaster Recovery Plan (DRP) portion of the Information Security Policy. Include the following:…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    JIT2 Risk Management

    • 2004 Words
    • 9 Pages

    The goal is to minimize the impact of any disruption by containing it within a predictable and predetermined period of time. To do this, I recommend that this plan be developed and implemented with as many preventative controls, contingency resources, and procedures designed to allow the organization to quicky bounce back from any long-term business interruption. With this document I’ll present a workable DR plan that focuses not only on safeguarding critical data but also on the restoration of all normal business functions.…

    • 2004 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Disaster Plan It

    • 1313 Words
    • 6 Pages

    Backing up data on a monthly basis does not substantiate good practice for data security and integrity. A system should be backed up daily. These daily backups can be kept onsite for purpose of system recovery however an additional backup should be done weekly and this backup should be stored offsite at a location that is environmentally safe for the media, therefore backup media also needs to be considered in…

    • 1313 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    continuity plan overview

    • 689 Words
    • 3 Pages

    In this writing I will be presenting the main duties for the Business Continuity Lead/Manager position. I feel this position is one that is of great importance, particularly in dealing with the sensitive healthcare information and systems that you all use on a daily basis. This position gives you at least some insurance that if something were to happen your company would not be lost or have a great deal of downtime from providing your essential services to your clients. I will begin by describing some of the task that are requirements of this position.…

    • 689 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    A disaster recovery plan is a plan to restore a critical business process or system to operation after a disaster. It is invoked after a disaster such as flood, tornado and hurricane.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    The disaster recovery plan provides a risk analyst that lists the possible threats to this company and the critical business processes that require protection. This plan also provides suggestions for preparing a backup site, and goals for getting the business back up and running.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Good Essays

    The key elements of a disaster recovery plan are to keep computers running, meeting all agreements between customers and suppliers, and being proactive rather than reactive. Keeping the computers and systems running is an essential element to the disaster recovery plan. The systems and computers are the link to the services they provide. The business relies on the internet for their marketing or sales needs, especially in today’s world of business. Meeting the agreements between customers and suppliers is essential because they trust your business will deliver these services. Being proactive rather than reactive is always a good thing for a business to have. The employees or personnel should already know what to do when…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6

    • 806 Words
    • 4 Pages

    A disaster recovery plan, is a plan for business continuity in the event of a disaster that destroys part or all of a business's resources, including IT equipment, data records and the physical space of an organization.…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It is important that we keep personal information stored securely, ensuring that confidential information is not unlawfully or inappropriately assessed. This means that we must not leave information hanging around where it may be seen by others and we must use used the lockable cabinets provided by your setting to store information safely; these cabinets should be kept behind a lockable door which should be kept locked whist not in use. We should ensure that our computers have secure passwords which are changed regularly and that and that any IT portable storage and emails are encrypted. Make sure that passwords are not shared and that you log off before letting someone else use the computer…

    • 619 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays

Related Topics