Preview

Proposal for a Backup Solution

Satisfactory Essays
Open Document
Open Document
452 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Proposal for a Backup Solution
Proposal for a Backup Solution

Working as a volunteer for a small non-profit organization, I have been asked find a suitable backup solution for our environment. The plan should allow, not only the backup of critical data, but also the ease of moving the data offsite in the event of a disaster. Requirement The organization consists of twelve workstations, one being a laptop, all less then three years old. Each workstation runs Windows XP and is connected through a LAN and to the internet. The organization has determined that 10-15 GB will need to be backed up each week. I have been given a grant in the amount of $500 to implement a backup solution that will work with this environment.
Backup Solution Proposal After considering many options, I decided to go with a tape backup system. With tape backup, the organization will be able to store data offsite giving them the protection from a disaster which could potentially destroy the building along with all workstations and data. Since this is a grant I will try to use all available funds for our backup project, since most grants do not allow unspent funds to be used for other areas.
IOMEGA REV 35GB/90GB External USB 2.0 Drive The Iomega REV 35GB/90BG is a removable hard disk system that will provide portability and high-performance file storage. The device can be found for as little as $278 on the internet. Additional backup media should be purchased to allow for a proper rotation schedule. Four Rev 35/90GB disks can be purchased for $181.96. The total cost of hardware will approximately be about $460.
IOMEGA REV 35/90 Features
• Complete: Everything you need to get started with backing up, or replace an existing tape or optical backup solution, including 1 REV disk, professional-level backup software, and an easy how-to-guide.
• Fast: Backup and recover files up to 8 times faster then tape.
• Easy: No cleaning or maintenance required; appears as a standard drive letter.
• Durable:

You May Also Find These Documents Helpful

  • Good Essays

    I run a software company called Tyrannical Smiles, out of San Jose, California. We focus on the ever growing video game industry. We have a series of successful science-fiction adventure role playing games that we have created, and are constantly upgrading the scenarios and adding new add ons all the time. We have a large customer base that is constantly growing and ordering more of our software as it becomes available. With this, we run into the situation of having their credit information on file as well as transaction histories that would be extremely detrimental to our company if they ever got lost or hacked. The way we have decided to backup our system is as soon as a customer uploads their information to make a purchase, it is immediately transferred into the system as a temporary file, at the end of each work day, we have all the temporary files transferred to our Cloud. The Cloud infrastructure allows for our company to securely share our files amongst one another, with also insuring that our information remains just that, ours. To guarantee that our Cloud isn’t hacked or if the server goes down or fails, our information isn’t lost, we have set the system to run with a Cloud Encryption Key rotation. We are using a split key encryption, meaning that I am the only one that has access to the key. No one including the government has access to this key. Be that as it may, security is always the number one priority for data so every month I change my encryption key to ensure that further security is in place. After one calendar month of information is gathered, we save all the data and transfer it using a hard disk. This hard disk is then taken by me once a month to a safety deposit box I have setup at a bank to store all the information securely. So once the information is in the Cloud, if the server fails for some reason, we will not lose…

    • 709 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    It Management Mgt2 Task 3

    • 4060 Words
    • 13 Pages

    Time is a risk for this project on several levels. 173 employees this will be affected as well as their customers. The company has agreed that this is a good move, however, if the process of setting up the equipment, managing the security and providing training goes on too long, then it will start to negatively affect the company over-all. Currently there is concern if the technology will be delivered due to an unforeseen fire, this set back will be costly in time and work. Also, a second part of time being a risk is managing faulty or dying equipment. Home offices will take longer to assess and fix in the long run. IT staff will either have travel to employee’s homes, or employees will be held up having to come into the home office for repairs.…

    • 4060 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Common buisness best practice daily incremental backup, a weekly full backup, and once a month you make a special backup that is kept in storage.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Before approaching the project objectives, one must first understand a little background on the project. What is this company? Software Solutions started in Idaho as a small company, family owned. Through the 1980s, the company was able to provide reliable software solutions to its customers, creating one of the first user-friendly inventory tracking software solutions to the farmers. Each year, the need for this great inventory tracking software increased. Subsequently, new versions released each year. The company expanded its database software customizable to each of the users. The company was growing so fast that no longer could the small family support this software alone. After much thought the family decided it was time to rent an office space, hire outside help, and build a small help desk for software support. A successful project will ensure constant support for the product, reinforce customer confidence, and in return increase revenue.…

    • 3456 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I highly suggest investing your money into Dropbox for business as it is trusted by many high end companies as well. If you have any question or concerns please contact me at my information below.…

    • 374 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Exercise 1 Upgrading

    • 444 Words
    • 2 Pages

    I heard from my friend, Bob S., that you have a great deal of knowledge about this, so I’m wondering if you will act as a consultant for me. I have a dental office in town, and we’re running eight Windows XP workstations and a single server running Windows Server 2003.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | Many service jobs are highly skilled such as physician, attorney, airline pilot, OSCM instructor, etc.…

    • 592 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Treats that this company is vulnerable to are but not limited to tornado, malware, equipment failure, stolen data, DoS attacks & social engineer. The like likelihood of each is moderate to high. Headquarter is located right in tornado alley. Since this building house all three serves, a direct hit would result in a total loss. Since the users connect to the LAN with Windows Vista which is very outdate the risk of malware is also high. Along with having all three servers in a central location, there is no mention of any backup locations or even if a DRP is in place. Therefore equipment failure (loss of data) is very high. There is a mention of a direct attached storage but it appears that there is no AUP in place. This means everyone has access to the data. Stolen confidential data of a customer is a serious and costly risk. There is no mention of any firewalls in place. If the servers are not protected by firewalls or intrusion detection systems can result in loss of availability. Users and social engineering is the weakest and easily the most vulnerable. Lack of access controls and security awareness can result in serious loss of confidentiality and hackers are real threat in today’s world. With the sales people accessing the network through a home office and share internet connection with headquarters, this is the bulk of the concern.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unfortunately for 123 Textiles I cannot think of a RAID configuration that would protect them from what happened to them. RAID is to be used for redundancy in case of drive error or failure. It is a good thing that the backups are on an exterior drive since now data can be recovered (at least up until the day of the last backup) and business can go about steps to getting back up and running properly. It is understandable that some organizations must resolve to open their doors in areas that are high(er) in crime than other areas. This could be a matter of cost or a matter of geography. However, there should be measures taken to safeguard not only your commodities (i.e. employees, tools, hardware) but also your computer systems. If money is a major factor then I would recommend a few basic necessities. First I would recommend tamper proof windows. The kind that you see in some store fronts. It is clear just like glass but is much harder to break. I would also recommend more secure locks on the doors and windows. During business hours it may be necessary to keep some windows and some doors open. But after hours, each window and door should be locked securely so that intruders cannot get in. Alarm systems are widely found on doors. I would also have them installed on windows and have them set to be armed with the rest of the security system. The server itself should not be in an area where it is so easily accessible. The scenario isn’t all that in depth, so assuming the server is a stand-alone PC of sorts, it should be kept in an area that is away from the work area. For this situation a closet space that can be placed under lock and key would be a viable option. If the server is a larger unit that is (or should be) in a rack then I would recommend placing it in a room designated as a server room that is still under lock and key. The budget for the IT infrastructure is a concern, but regardless, core network components (such a server) should be protected and have that…

    • 628 Words
    • 3 Pages
    Good Essays

Related Topics