...continuity plans to quickly initiate operations at an alternate site until normal operations can resume at the primary site. Question 2: What are the two major component parts of BRP, and how are they related? Answer: The major two component parts of BRP are; 1) Disaster Recovery Plan: Lists and describes the efforts to resume normal operations at primary places of business. 2) Business Continuity Plan: Contains steps for implementing critical business functions using alternate mechanisms until normal operations can be resumed at the primary site. They are related because the BC plan occurs concurrently with the DR plan when the damage is major or long term. Question 3: What is the primary site? Answer: Primary site is the location or group of locations at which organization executes its functions. Question 4: What is the difference between a backup and an archive? Answer: * Backup is the snapshot of data from a specific point in time. The data is considered volatile and is subject to change While Archive is long term storage of a document or data file, usually for legal and regulatory purposes. * For recovery from an incident, backup are the most common solution. For recovery from disasters archives are used. Question 5: What is a retention schedule? Answer: Retention schedule guides the frequency of replacement and duration of storage of the backups and archives. Question 6: How have cloud computing architectures affected the backup options...
Words: 1288 - Pages: 6
...data backup and recovery plan. Backing up files can protect against accidental loss of user data, database corruption, hardware failures, and even natural disasters. It is your job as an administrator to make sure that backups are performed and that backup tapes are stored in a secure location. How important is the data on your systems? The importance of data can go a long way in helping you determine if you need to back it up as well as when and how it should be backed up. What type of information does the data contain? Data that does not seem important to you may be very important to someone else. Thus, the type of information the data contains can help you determine if you need to back up the data as well as when and how...
Words: 569 - Pages: 3
...State of Oklahoma Disaster Recovery Plan Template Version 1.0 31 October 2007 TABLE OF CONTENTS DISASTER RECOVERY PLAN – DOCUMENT CHANGE CONTROL 6 EXECUTIVE SUMMARY 8 Overview 8 Recovery Statement Summary 8 Recovery Scenario #1: The Preferred Solution for a Total Data Center Loss 8 Recovery Strategies: Activities and Time Frames 9 Short-Term (2 to 3 Days): 9 Medium-Term (6 to 12 weeks): 9 Longer-Term (6 months to 2 years): 9 Recovery Scenario #2: The Strategy for Loss of a Critical System or Component 9 Summary 10 INTRODUCTION 11 INFORMATION SECURITY POLICY – DEFINITIONS & STATED REQUIREMENTS 11 8.2 Disaster Recovery Plan 11 8.3 Business Recovery Strategy 11 PLAN DISTRIBUTION 11 PLAN OBJECTIVES 11 PLAN ASSUMPTIONS 12 Definitions 12 PROCESSING ENVIRONMENT 13 Scope of Recovery 13 Environment Description 13 Essential Equipment 13 Disaster Recovery Scripts 15 RECOVERY PLAN ELEMENTS 17 1. Recovery Plan for Major Disasters 17 A. Detection and Reaction 17 B. Identifying the problem – Notifying the authorities 17 C. Establishing a Command Center 17 D. Reducing Exposure 17 2. Roles and Responsibilities 20 A. Management / Damage Assessment Team: Initial Response 21 B. Disaster Recovery Teams — Emergency Contact List 22 (AGENCY) FUNCTIONAL AREA MANAGERS 23 3. Recovery Plan for Major Disasters 24 A. Establishment of Full Recovery at Backup Site 24 B. Disaster Recovery Team Checklists 24 C. Restoration of Facilities and...
Words: 17396 - Pages: 70
...Backup:- Data is the most important aspect of your computer. An operating system can be reinstalled and so can applications, but it may be difficult or impossible to recreate your original data. It is essential that you always back up your important information and have a plan for recovering from a system failure different security concerns for back up to be lost or stolen so we should the things to secured as follows Ensure your security policies include backup-related systems within their scope. Practically every type of security policy -- from access controls to physical security to system monitoring -- applies directly to data backups. Include your data backup systems in your disaster recovery and incident response plans. Data backups can be breached, compromised or destroyed. Be it a malware outbreak, employee break-in or hurricane -- otherwise good backups can be adversely affected and you need to have a plan outlining what you're going to do if that time comes....
Words: 488 - Pages: 2
...Insurance BCP William Gardner May 9, 2015 Task B. Create a business contingency plan (BCP) that the company would follow if faced with a major business disruption (e.g., hurricane, tornado, terrorist attack, loss of a data center, the sudden loss of a call center in a foreign country, the collapse of a financial market or other catastrophic event) in which you include the following: 1. Analyze strategic pre-incident changes the company would follow to ensure the well-being of the enterprise. 2. Analyze the ethical use and protection of sensitive data. 3. Analyze the ethical use and protection of customer records. 4. Discuss the communication plan to be used during and following the disruption. 5. Discuss restoring operations after the disruption has occurred (post-incident). Since 1919, A.I.I. has been in the business of insuring businesses and people from losses incurred through disasters. For 95 years (A.I.I.) has stood by its clients as they faced many challenges from the financial collapse of 1929 to the drought of the dust bowl years and even the ravages of World War Two. Assisting our clients in the face of hurricanes, tornados and even terrorist attacks is an everyday occurrence at A.I.I... However, who is planning and preparing for A.I.I.? A BCP is a plan to do exactly that, during the financial collapse of 2008 several flaws in the existing plans were exposed; flaws that not even the terrible events of September 11th 2001 had exposed....
Words: 3242 - Pages: 13
...To have a Backup and Disaster Recovery Plan for big companies and businesses is very important. Having this can save a company and ruin without it. There are many factors for a network to shut down or malfunction. National disasters and man-made disasters can always happen and to have such plan will at least guarantee a company to continuously running in a productive way. There are so many vendors out there who promote backup and recovery solutions in case of emergency. A company should always assess what their needs in case of an emergency and should always see if their chosen vendor can provide them with the service that they need. For a business to have a concise and useful recovery plan they should always focus on the problems that are likely to occur. “Focusing your plan on disaster results means contemplating problems such as loss of a single server, loss of the entire server room, loss of all of the customer service workstation computers, and so forth, without worrying about the possible disasters that might cause those results” (Hallberg, p. 163). A company should first assess the needs that the plan must meet. Identifying the needs of the company will not only give them a clear vision of what the plan must address, but also which other people from the different parts of the company should be involve in the planning process. Knowing the root of the problem is the first step in solving the problem. When planning for backup and disaster recovery plan one should consider...
Words: 1222 - Pages: 5
... Rel 1, Ver.0 8/11/2012 Richman Investments Business Continuity Plan By Emergency notification contacts Name | Address | Home | Mobile phone | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Date | Summary of changes made | Changes made by (Name) | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Revisions control page Purpose The purpose of this business continuity plan is to prepare Richman Investments in the event of extended service outage caused by factors beyond our control (natural disasters, man-made events), and to restore services to the company in a minimum time frame. All Richman Investments sites are expected to implement preventive measures whenever possible to minimize operational disruptions and to recover as rapidly as possible when an accident occurs. The plan identifies vulnerabilities and recommends necessary measures to prevent extended communication service outages. It is a plan that encompasses all Richman Investments system sites and operations facilities. Scope The scope of this plan is limited to disaster recovery. This is a business continuity plan, not a daily problem resolution procedures document. Plan objectives * Serves as a guide line for Richman Investments recovery teams. * References and points to the...
Words: 1306 - Pages: 6
...Business Continuity Plan on Information Systems Ronald E. Stamm Jr. ISYS 204 Professor Choi October 6th, 2011 Abstract Since the dawn of the new millennium, as more and more companies are becoming more technologically savvy, they have been coming to the realization that there is a need to protect that data somehow. These companies seek out IT professionals who help them create Business Continuity Plans. These Business Continuity Plans help companies better safeguard and effectively retain their essential data in the case of a catastrophic failure of their network infrastructure. In this essay, I will be discussing the different intricacies of a Business Continuity Plan and how to effectively build one to suit the needs of the individual company. The Effects of a Business Continuity Plan on Information System A frog if put in cold water will not bestir itself if that water is heated up slowly and gradually and will in the end let itself be boiled alive, too comfortable with continuity to realize that continuous change at some point may become intolerable and demand a change in behavior. (Handy, 1990) There have been so many companies over the years that have failed due to lack of a proper Business Continuity Plan. Taking the time and utilizing the correct resources to create a Business Continuity Plan can easily counteract this. In this essay, I will provide an example of a few companies who did not have proper Business Continuity Plans and how that can affect...
Words: 3859 - Pages: 16
...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1. Backup system: a. Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b. Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1. Antivirus system: a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...
Words: 1841 - Pages: 8
...wants you to develop a backup and recovery plan for Active Directory. You also need to develop a monitoring scheme to ensure the new Active Directory environment remains available. Explain this backup and recovery plan along with the tools needed to monitor the active directory environment. Submission Requirements: Submit your response in a 1-2 page Microsoft Word document through the Questa Learning Plan. Evaluation Criteria: Your instructor will use the following points for evaluating your performance in this assessment: * Did you discuss a backup strategy or Active Directory? * Did you discuss a recovery plan for Active Directory? * Did you discuss a monitoring scheme for Active Directory? Windows Server Backup provides several Group Policy settings that give you some limited control over how backups work on your servers. With these backup policies, you can mitigate some of the risks associated with people performing unauthorized backups to obtain access to unauthorized data. The options include: Allow Only System Backup If this is set, Windows Server Backup can only back up critical system volumes. It cannot perform volume backups. Disallow Locally Attached Storage as Backup Target When enabled, this setting does not allow backups to locally attached drives. You can only back up to a network share. Disallow Network as Backup Target This setting does not allow backing up to any network share. Disallow Optical Media as Backup Target When this is set...
Words: 297 - Pages: 2
...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1. Backup system: a. Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b. Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c. Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1. Antivirus system: a. Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...
Words: 1841 - Pages: 8
...Riordan Manufacturing has asked our firm, LTB and Associates, to develop a web-based plan to be used as a Business-to-Business web site in order to purchase materials from their vendors. We have examined Riordan’s products and business systems, interviewed Riordan’s employees, and have determined the best course of action to implement the plan. Riordan Manufacturing is a plastics manufacturer based in several locations across the world. With three plants based in the continental US, which are located in Albany, Georgia; Pontiac Michigan; and in San Jose, California, which is the company headquarters. A fourth plant is located in Hangzhou, China will not be part of the plan as they purchase materials locally. This where we explain how the database will be set up. Refer to the ERD, Sequence diagram, Use Case diagram, and Class Diagram that followThe following paragraphs will describe the considerations that Riordan Manufacturing will need to make in implementing the database plan. Where ever it is possible to for our firm to do so, LTB and Associates will make a recommendation on the choice to make. In order to implement the database properly, these recommendations should be implemented in order to offer the tightest amount of security that will be possible. Type of Online ProcessingRiordan Manufacturing will need to decide between real-time asynchronous processing and batch processing. Real-time asynchronous processing is applicable when the processing must be performed...
Words: 2477 - Pages: 10
...protect its information, its people and protect the business overall. Having an air tight management information system (MIS), will greatly improve the chances for the business operations to run smoothly. Behind the scenes of an MIS are three strong plans that if used properly, will be highly effective in protecting a business from failing. The plans are backup and recovery, disaster recovery and a business continuity plan. Having a backup and recovery plan is essential if you want to protect information that may potentially be lost due to system failure. A backup is referring to just that; a backup. It will duplicate the exact information for that system. Recovery is the ability to get the system up and running again, including the backup. These two plans will ensure that if a system does happen to fail, the transition process will be smooth. It is also, in a business’ best interest to practice backup quite often. That will ensure the most up to date information being stored and saved. With natural disasters occurring every day, a business must always prepare for the worst. That is why having a disaster recovery plan is critical to ensure the business isn’t halted for hours, days or weeks. A disaster recovery plan is a plan to basically be able to get back to work after a disaster. This includes recovering information, recovering the system, and having a new location already set for you to get the ball rolling again. Most organizations have either...
Words: 510 - Pages: 3
...Back up As our back up plan for this proposal we have decide to go with a full back up plan to back up all data on the existing Novell server , after implementation of our new network installation and server migrate all data, as a backup jobs selection we have decide to go with a full back up on a weekly basis and an incremental on a daily basis schedule to happen between 2 am and 4 am on which the network has less traffic and also less data changes, following this back up forms we can have a consistent back up procedure to ensure data is back up, also a backup restore to be tested every 30 days to ensure all data backup is correct and we have no corrupted files that also give us piece of mind we also have created an access group that only has access to the backup system there for making another layer of security also we have all data back up to an external site due to the interface of the software that comes integrated with backup servers, we have secure backup to up to two secure geo locations, reduplicated efficient back up storage, redundant disk base storage we can also manage all servers from the another backup server on the same network the backup schedule could be dynamic meaning that we have an option that lets the software decide when to do a full backup due to the bandwidth availability on a time range the flexibility of this interface will allow us to recover all data, schedule backup , and pick which systems to back up. With this system we can recover files immediately...
Words: 563 - Pages: 3
...Plan Approval Provide a statement in accordance with the agency’s contingency planning policy to affirm that the ISCP is complete, and has been tested sufficiently. The statement should also affirm that the designated authority is responsible for continued maintenance and testing of the ISCP. This statement should be approved and signed by the system designated authority. Space should be provided for the designated authority to sign, along with any other applicable approving signatures. A sample language is provided below: As the designated authority for {system name}, I hereby certify that the information system contingency plan (ISCP) is complete and that the information contained in this ISCP provides an accurate representation of the application, its hardware, software, and telecommunication components. I further certify that this document identifies the criticality of the system as it relates to the mission of the {Omega Research Inc}, and that the recovery strategies identified will provide the ability to recover the system functionality in the most expedient and cost-beneficial method in keeping with its level of criticality. I further attest that this ISCP for {Information System Contingency Plan} will be tested at least annually. This plan was last tested on {12/3/2011}; the test, training, and exercise (TT&E) material associated with this test can be found {TT&E results appendix or location}. This document will be modified as changes occur and will remain under version...
Words: 4591 - Pages: 19