Free Essay

It/240 Disaster Plan

In:

Submitted By nunkikun
Words 1186
Pages 5
Disaster Plan
Nunki J Rosas
IT/240
Sunday, April 7th, 2013.
John Helt, MISM, MCSE

Disaster Plan
Scenario:
The IST Department of XYZ Computers is located on the first floor. Payroll and all human resources records are processed daily and bi-weekly for 10,000 employees. After payroll is run, data is backed up using tapes. No firewall is in place, and e-mail is on the same server as payroll.
XYZ Computers is located in the southern part of the United States in an area that receives heavy rain. During the weekend, a major water pipe broke and flooded the first floor. The water caused extensive damage to the servers, which were also on the first floor. Create a disaster plan to prevent this sort of problem from happening in the future.
Proposed solution:
The way in which XYZ Computers has their IST Department set up currently is susceptible to many threats. The lack of a firewall is an open invitation for data to be stolen by prying eyes, and the vulnerability of placing the payroll database is in the same server as the email service. The geographic and weather conditions of the location of the company have a high risk of flooding, yet the Servers were installed on the first floor. Lastly, the backup method in place is sort of outdated and there is no mention on how often the backup takes place; additionally, the backup tapes themselves could be damaged, lost, or stolen. These recommendations are an attempt to improve XYZ Computer’s network data security, prevention of data loss, protection against network failure, and contingencies for natural disasters.
First and foremost, there has already been an incident where the network servers were damaged due to flooding in their physical location. It is then logical to start by redesigning the physical configuration of the servers, placing them on a higher level floor (assuming there are several floors to the XYZ Computer’s company building). Relocating the IST department should not be a lot of trouble, but will prove to be a valuable strategy to prevent network failure and data loss; which directly impacts productivity. The new configuration for the IST department should take in consideration the typical natural disasters they are susceptible to and position the servers in a manner that they are protected from them.
Secondly, the backup method for data needs to be updated. Instead of using backup tapes, the company can use a redundant disk system based on RAID technology. Tomsho (2011) stated, “Redundant disk systems can prevent data loss in the event of a disk failure; in fact, a system with a redundant disk configuration can continue operating with no downtime.” (p. 447). Therefore, by implementing disk mirroring for example, the hard disks on the server containing the payroll database would be a synchronized copy of one another. Then if one of the drives fails, the other one kicks in allowing the system to continue operating. Also, the email service should be moved to a different server as the one used for the payroll database because of the vulnerability of attacks and threats of computer viruses which can infiltrate the system through the email service port. Strong network security software should be put in place to protect the network from said threats, with a good performance firewall and real-time scanning of files in order to detect any kind of attack or even an attempt of attack.

Besides the backup and network data protection, the possibility of power outage must be considered. For this reason it would be necessary to use redundant power supply (RPS) and uninterrupted power supply (UPS); which according Tomsho (2011), would ensure the system has a consistent power flow and provide power temporarily in the event of an outage. An RPS makes sure there is a secondary power supply ready to kick in when necessary and it also helps regulate any fluctuations in power which could result in damage to the computer hardware. The UPS provides surge protection and has a built in battery which will keep the computer running until power is restored, or the system is properly shut down. When there is a power fluctuation or outage, the system will reboot itself causing the users to lose data they were currently working on, and can also damage the hard drives of the system servers when it is not shut down properly. Data can become corrupted and/or completely lost, in some cases rendering the whole system useless until the backup is restored. Therefore, all essential components of the network (servers, hubs, switches, etc.) should be protected in one way or another against power failure and damage due to power overloads.

In addition to the disk mirroring for back up, XYZ Computer’s payroll database should be backed up to an external device on a regular basis. This device should be then kept secure, and if possible, at a different location than the rest of the network servers as a backup redundancy. It would also be recommended that the data of such backup be encrypted to add an extra layer of security due to its sensitive nature. A different route of protecting the information is by using the RAID 5 method which works by spreading data across multiple disks and using one disk in each write operation to store parity information. Parity information is generated by a mathematical calculation on data being written, so if one of the disks fails, his information can be used to re-create lost data from the failed disk (Tomsho, 2011). This method could be chosen over the first recommendation because it reduces the work load and allows for a faster system. An important change to the configuration of the servers is to start using server clustering with at least two servers functioning as one unit in which the payroll database is contained. If these two servers can have a different geographic location, it would be a great backup alternative; but even if implanted within the same building, it will ensure a continuous network operation.

All of the above recommendations can be fine-tuned by obtaining additional specific information form the company such as the type of computer threats they have been prey to, the workload on the network, user’s credentials and permissions within the network, and any other relevant data to help identify vulnerabilities. Since the most important part of this disaster plan is the relocation of the IST department, there is an opportunity to upgrade and add any additional components to the network in order to make it more secure and efficient. Payroll information is one of the most sensitive databases within a company, so special consideration needs to be applied to protect the loss of data internally, as well as any potential outside threat to this data. I would strongly suggest the use of RAID 5 method for backup and consistency of information along with security software that would allow monitoring the access to the payroll database and protecting it from unidentified intrusions.

Reference:
Tomsho, G. (2011). Guide to Network Essentials (6th ed.). Clifton Park, NY: Cengage Learning.

Similar Documents

Free Essay

Chernobyl

...The topic I have chosen for my research paper is Chernobyl disaster that happened on 26 April 1986 at the Chernobyl Nuclear Plant in Ukraine (then officially Ukrainian SSR). Chernobyl is considered to be the worst nuclear power disaster in the history. I will be talking about what caused such a big accident, effects of it for the country and the world, crisis management and consequences for people and environment. Chernobyl disaster was caused by human error. There was a test to find out how long it needs cool the reactor if engineers shut down it using only the residual steam and coasting turbines for power to run the coolant pumps.  To run this test they had to switch off several automated safety systems. The experiment didn’t work out and ended as the greatest disaster in the world. The number of people whose lives were affected by the disaster is enormous. An estimated 350 000 clean-up workers or "liquidators" from the army, power plant staff, local police and fire services were initially involved in containing and cleaning up the radioactive debris during 1986-1987. About 240 000 liquidators received the highest radiation doses while conducting major mitigation activities within the 30 km zone around the reactor. Later, the number of registered liquidators rose to 600 000, although only a small fraction of these were exposed to high levels of radiation.  It also resulted in an impossible to count number of Thyroid cancer cases that often result in death. The entire nearby...

Words: 438 - Pages: 2

Free Essay

Disaster Plan

...Kayla Pederquist Disaster Plan IT/240 9/19/14 Company B 123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server. Create a disaster plan that would better protect the organization’s technological assets. 123 Textiles has placed itself into a difficult position. While it may be able to survive many of the regular issues -- the earthquake zone, the high crime area - it will not be able to continue without making additional effort to protect its property and its information. The first thing to address is the theft of the server. Obviously, anything that could be taken in a simple "smash and grab" robbery will be a target in a high-crime area. All equipment that can be taken so easily should be moved away from windows, and the server and computer system itself needs to be protected doubly, since it may also contain personal information on employees and customers. A centralized location in the building would be best. For the data security, a system should be backed up daily. If it is backing up to a separate hard drive off location that may be appropriate, however that back up must occur daily and must be protected. Many businesses back up daily and then a separate back up is done once a week and kept aside, meaning at least two drives would...

Words: 1129 - Pages: 5

Premium Essay

Information Use

...CIS/240 Today Information is the lifeblood of all modern businesses. From Manufacturing, Customer Support, HR, Quality Assurance and Engineering, each department relies upon information in some form shape or fashion to accomplish their task. As a former Customer Support Engineer, I received calls from customers all over the globe. As I spoke to those customers, I would log a trouble call for a specific product for that customer. With the customer on the phone I would have information about their locations, the different types of systems installed, the number of drives, the type of power supplies, and software configurations. To this already stored information, I would add additional information to the database. Information such as what trouble the customer is experiencing today; is the customer's data currently available or unavailable, if unavailable how long has the customer been out of operation. This data is collected for every customer and stored. As this data grows daily, the use of enterprise storage solutions was implemented where it is backup to a secondary site for disaster recovery. As this is a 24/7 call center, all upgrades, hardware or software were first performed on a non-production side of a duplicated environment before upgrading the disaster recovery site, followed by the production site. The information gathered from the customer service department would flow throughout the organization as a whole, and allow departments that rely on the data to...

Words: 633 - Pages: 3

Premium Essay

Homework

...Jyteris Horne Information Security Fund Mr. Everett Chapter 4: Case Project 1-20 1. It is the process of identifying risk represented by vulnerabilities to an organizations information assets and infrastructure. Also taking steps to reduce this risk to an acceptable level. 2. The two key understandings are knowing yourself and knowing the enemy. 3. Security professionals are responsible for risk management in an organization. The IT community takes the lead in information security risk management. 4. Threats are constantly changing for a company and also once any specific vulnerability is completely managed by an existing control it no longer needs to be considered for additional controls. 5. Networking components need more examination from an information security perspective than from a systems development perspective because networking subsystems are often the focal point of attacks against the system. 6. All hardware components are already identified, make and locations, and management can review for the most critical items and assess the values. 7. The IP-address for network device. 8. Comprehensive is more important than mutual. 9. The difference is generating revenue refers to the asset producing a cash flow that is linked directly to the asset. If the assets weren’t there then no money would be made. Assets that generate profit don’t produce cash directly. 10. Vulnerability is a weakness in a controlled system where controls...

Words: 806 - Pages: 4

Premium Essay

Aftermath of Chernobyl

...Aftermath of Chernobyl Chernobyl remains as one of the worst nuclear disasters recoded in modern history. Even though the most severe consequences of the event occurred in the Soviet Union, this incident changed the course of modern European history. This event affects nuclear industry through the decline in nuclear power plants, anti-nuclear movements, arms agreements through nuclear disarmament, environmental movement, and more renewable energy sources. Chernobyl is a catalyst for Germany’s place as an anti-nuclear country as well as a leading developer in new renewable sources of energy for the modern world. Some background information about the Chernobyl disaster was initially discovered when a Swedish Nuclear power plant “set off warnings during a routine radioactivity check… When other nuclear power plants reported similar happenings, the authorities turned their attention to the Soviet Union, from which the winds were coming” due to the fact that the Soviet Union attempted to hide their serious nuclear problem. When the Soviet Union finally admitted the accident occurred, due to pressure by Sweden under UN treaties, the USSR claimed, “the Chernobyl accident was the first ever in a Soviet nuclear power plant” or in other words the first accident they admit to happen. According to the Encyclopedia of Russian History, the disaster ironically happened after a failed safety equipment test that blew off the roof of reactor four. It ultimately killed thirty-one people from the...

Words: 1667 - Pages: 7

Premium Essay

Life Skills Curriculum Development and Management Division

...kemahiran hidup yang komprehensif dalam membantu mereka membangunkan kemahiran untuk kehidupan seharian yang meliputi berbagai sudut dari kemahiran mempertahankan diri atau mengembangkan kemahiran menangani masalah dalam bidang perhutanan dan air, pengurusan tekanan, pengurusan kemarahan dan pengurusan wang, komunikasi kemahiran, kepimpinan dan kemahiran sosial) LEARNING By the end of this course, students will be able to: OUTCOMES o Recognize knowledge of forestry and aquatic in the region. [C1, CS, CT, TS, LL, EM] o Select suitable evacuation strategies and manage the setup of logistics when dealing with natural and man-made disasters. [CS, CT, TS, LL, EM] o Demonstrate appropriate communication skills when dealing with different situations and subjects. [CS, LL, EM, LS] o Build trust and comradeship among people in local and international negotiation [P5, CS, CT, TS, LL, EM, LS] Generated using the eCLASS System. 1 / 4 DSSL1014 Life Skills Curriculum Development and...

Words: 701 - Pages: 3

Premium Essay

The Lingering Effects of the Bp Oil Spill on the Gulf Coast

...The Lingering Effects of the BP Oil Spill The rest of the world has long forgotten the disaster that tore through the states along the Gulf of Mexico. Its lingering effects can still be felt three years later. The Deepwater Horizon oil spill in 2010, otherwise known as the BP oil spill, has left the states of Florida, Alabama, Mississippi, and Louisiana in recovery mode. The oil spill not only affected the ecology of these states, but also the economy. This tragic disaster claimed the lives of eleven men. It also disrupted the way of life for the numerous people employed by the seafood industry, and its consumers. The shrimping industry located in these states in the year 2006 accounted for “83% of the total US shrimp landings”, according to John Tunnell (2011). Based on the results of the survey I conducted in Biloxi, MS, along with research I have done, I have found that locally both consumers and businesses are more willing to support the local shrimp industry than they are to purchase imported shrimp. However, on a global scale consumers are still wary of eating shrimp caught anywhere on or near the Gulf Coast. The people residing on the Gulf Coast of the United States of America are a resilient group. They have endured three consecutive extraordinary catastrophes: Hurricane Katrina, the BP Oil Spill, and the Mississippi River Floods, and still somehow have continued to strive and continue their way of life. However, the shrimp industry took a huge hit after the BP...

Words: 2464 - Pages: 10

Premium Essay

Religion

...Amina Irene Oyatedor English 240 May 4, 2009 “The Beautiful Machine” By Robert O’ Harrow jr. and Brady Dennis Washington Post Staff Writers Monday, December 29, 2008; A01 The Beautiful Machine takes us back to spring 1986 with three aspired men that wanted to change history and developed their apparition in AIG. Howard Sosin in his mid-30’s with his strong stern and determination characteristics about him. Then there is computer wiz and fond of Arts & Literature his name is Randy Rackson he is also in his mid-30. Finally the genius and with a PhD in economics Barry Goldman who worked for Drexel; company with a reputation of high interest rates and low wages. These men wanted to leave Drexel and start a new work life in AIG on Wall Street. Sosin and Rackson had a financial idea to advance their career move at a late night dinner during their lunch break. “Sosin and his team needed the backing of a company with deep pockets, a burnished reputation and the very top credit rating, a Triple A institution as unlikely to default as the U.S Treasury itself. One name topped their wish list that fall: American International Group, or AIG, the global insurance conglomerate considered one of the world’s safest bets.”(Washington post, Robert O’ Harrow jr. and Brady Dennis, Dec, 29, 2008). Sosin was the brain of the plan to change stocks and investments with AIG he knew how to get in with his finance theories and his charm. Rackson and Sosin, Goldman needed to develop a well-designed...

Words: 414 - Pages: 2

Free Essay

Lan Consultation

...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1.      Backup system: a.     Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b.     Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c.     Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1.      Antivirus system: a.     Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...

Words: 1841 - Pages: 8

Free Essay

Lan Consulting Plan

...LAN Consulting Plan IT/240 February 26, 2012 James (Garrett) Miller LAN Consulting Plan Data Assurance: 1.      Backup system: a.     Type? Backup of data will be done with the Norton 360 version 6.0 antivirus protection suite provided backup utility, Symantec Backup Exec. There are two types of backup for this network. The first is a digital tape drive backup that is located on site for intermediate recovery based on the disaster conditions. The second backup is a mirror backup on a bank of servers at an external site to ensure the security of the data in the case of total disaster of the network site. b.     Backup Schedule? The backup schedule will be determined by the importance of the information. Business critical information will be backed up at the completion of the task. A scheduled mirror backup will be done daily during the off business hours. c.     Backup Data Storage plan? The first backed up data will be stored on an independent server drive using RAID at the main site location for ease of access in the case of an independent component failure. The second backup will be also use RAID and be stored at a different graphical location than the network. Data Integrity: 1.      Antivirus system: a.     Type? Norton 360 version 6.0 antivirus program is installed at each geographical location including the offsite backup of the network. This security protection will provide virus protection, spyware protection, and scan incoming and outgoing e-mail...

Words: 1841 - Pages: 8

Free Essay

Variance Budget

...Variance Analysis HCA-240 Variance Analysis The many reasons as to why the budget for this month has gone over have many factors involved. For a $5,000 favorable variance on staffing, the department head can state that the company was able to obtain a 25 % discount from a new supplier, which resulted in a savings for the department. Another example would be when you have a $25,000 unfavorable variance in sick time for many employees, the department head would state there was an outbreak earlier in the season and this was not expected, resulting in hourly and sick time expenses that were not anticipated. What we can do, would be to analyze variances by the month, quarter or year. Having budget variances in place can allow at least two sources the things that can be controlled and things that cannot. This time I know that the reason the salaries were higher, we because of the recent storm we had and it cause some staff not to show up for work and other to do overtime. Going forward what we can implement would be an emergency team for weather related issues or natural disaster to ensure that we don’t go over our budget and if we see that we are approaching that then we can implement another plan or process, to help balance it back out like giving comp time or early leave. When uncontrollable factors occur many are often external which then result from occurrences outside of the company such as a natural disasters, which can then throw the budget into a downward...

Words: 810 - Pages: 4

Premium Essay

Capstone Project

...ITT Capstone Project NT2799: Network Systems Administration | Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Donna Williamson, Andy Lara, Mary Hunter, Carlos Vargas, Matt Koppe, Morten Laigaard Table of Contents Part 1: Structure of WAN2 Part 2: Types of Equipment7 Part 3: Protocol Choices25 Part 4: Phone System73 Part 5: Security Proposal78 References89-92 Part 1 Structure of WAN Structure of WAN- Mary Hunter We have initially considered our LAN components and began our documentation. We have planed the design and determined all resources involved. We have considered and interviewed all the stakeholders involved. We are in the beginning stage, so the components, resources, stakeholders and design may change. We will use switches to connect hosts to the internetwork, and both hubs and switches will be used to interconnect devices in our star network architecture. This way if we need to add workstations we will only have to insert another hub or switch. All of ABC worldwide offices will include file services, print services, message services, directory services, and application services. All of the offices will have the use of a file server for file sharing backing up files and storage. They will have access to a print server that will include Queue-based printing and print sharing; a message server that will allow for e-mails with attachment files, including video, sound, and documents. All the offices will have access to a...

Words: 13943 - Pages: 56

Free Essay

Szt1 Community Assessment

...Pierce County, WA Community Assessment Western Governors University Pierce County, WA Community Assessment Community Description and Data Interpretation Pierce County is situated in the central west of Washington State. The county is divided by Puget Sound, with the majority of the land to the east of the major waterway. There are several small islands included in the county that are located near the southern edge of the Sound. At the county’s eastern border, the beginnings of foothills lead to the actively volcanic Mount Rainier’s summit. Many parts of the county today are built upon the deposits of lahar from past eruptions. The geography of Pierce county ranges from a rocky shore to a lush, national forest with many lakes, rivers, and creeks in between. Overall, the county has 1794 square miles of land and 118 square miles of water, not including Puget Sound (Pierce County Department Of Emergency Management, 2010). Pierce County became well known in the late nineteen hundreds when the city of Tacoma became the western terminus of the Northern Pacific Railroad – the first transcontinental railroad in the north. The introduction of this railroad led to an increase in shipping and manufacturing in the area. At the time, lumber, shipping, farming, and coal mining powered Pierce’s economy. With the exception of mining, all these industries are still present today, though industrialization has made them less prominent than in the past (Pierce County Department...

Words: 1765 - Pages: 8

Premium Essay

Elizabeth Holmes Accomplishments

...From the moment she was born Elizabeth Holmes was pushed towards a life of advancements and innovations. Holmes’s parents, Christian Holmes IV and Noel Anne, both spent their time working in disaster relief with Christian working with government agencies such as USAID and Noel working as a Congressional committee staffer. At nine years old the Holmes family made a journey from Houston to China, and this is where she claims her first business was started. Elizabeth started her entrepreneurship by selling C++ compilers to Chinese universities, and this business lead to her love of medicine. Despite the call of the medical field, Elizabeth had to find a different way to channel her interest in science and medicine as she was hindered by her phobia of needles and repellant feelings towards blood. After she graduated St. John’s School in 2002, Elizabeth was accepted into Stanford University to pursue a study in chemical engineering....

Words: 832 - Pages: 4

Premium Essay

It240

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |IT/240 Version 4 | | |Intro to LAN Technologies | Copyright © 2012, 2009, 2007 by University of Phoenix. All rights reserved. Course Description This foundational course covers local area network topics including rationale for networking, the open systems interconnection (OSI) model, common network topologies and architecture, client/server concepts, basic hardware devices and usage, and basic networking security concepts. Policies Faculty and students will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you...

Words: 2355 - Pages: 10