SlideShare a Scribd company logo
1 of 26
CSE371
Contingency plan for
CloudClass.org.bd
Page 1
Group Project by: Team Awesomeness
Sl. Name I.D. Signatures
1 Samiya Yesmin 11304043
2 Protiti Khan 11304018
3 Tanzeela Rahman 12304005
4 Upama Sarkar Borna 12104034
CSE371:
Management information System
Course Instructor:
Mr. Syed Mahmudur Rahman
Section 03
15/03/2015
Page 2
Acknowledgements
Group 1: Awesomeness
Sl. Name I.D. Individual Contribution
1 Samiya Yesmin 11304043
Team Leader, Report organizer and editor.
VI. IT Contingency Plan for CloudClass
VII. Budgeting
X. Conclusion
2 Protiti Khan 11304018
Executive Summary
II. IT Contingency Plan and its importance
VIII. Contingency Staff Training and Plan Testing
3 Tanzeela Rahman 12304005
Logo Design and Presentation Slide.
III. Functions of CloudClass
IV. IT Environment of Cloud Class
VI. IT Contingency Plan for CloudClass (Hardware)
4 Upama Sarkar
Borna
12104034
I. Introduction
V. Integral Aspects of the Contingency Plan
IX. Contingency Plan Review Process
The video presentation was a joint effort of the entire team.
Disclaimer
www.CloudClass.org.bd is a business idea of its co-authors and is not-yet a factual business.
The co-authors acknowledge the trademarked status and trademark owners of the following word
marks mentioned in this paper:
Khan Academy, Coursera.org, Google, Facebook, OpenDrive, Adobe Premium Pro, liteCamHD,
Cannon, Dell, Camtasia Studio, Dhaka Web Host.com, Alpha.net.bd/, Avast Antivirus, Kaspersky
Security, Skype, Facetime and Viber.
Page 3
Executive Summary
Natural disasters, terrorist acts, large-scale accidents, and cyber-attacks all have the potential to
cause a catastrophic loss of information technology systems and infrastructure. In the event of such
an outage, it is vital for organizations to ensure their business processes which are vital to the
mission and survival of the organization, continue. CloudClass.org.bd is a business that works with
the top universities of Bangladesh, to provide online course lectures as an alternative method to
registered students. The purpose of this report is to develop an Information technology contingency
plan for CloudClass.org.bd, in order to prepare the organization to react lucidly to an unplanned
situation. The report contains the business that is CloudClass.org.bd, the importance of IT
contingency plan. the crucial components of CloudClass that can be under threat, our contingency
plan, containing the business process continuity, disaster recovery and incident management plans.
In the review process of the contingency plan we will have a quality controller who will weekly
review the whole process. Also, we will be having a precautionary measure to determine any
possible foreseen disaster. We have also figured a budget that could be required for the said
contingency plan as well as our planned staffing and training process for our employees, with
regards to the contingency plan.
Page 4
Table of Contents
Acknowledgements........................................................................................................................2
Disclaimer ......................................................................................................................................2
Executive Summary.......................................................................................................................3
I. Introduction...........................................................................................................................5
II. IT Contingency Plan and Its Importance...............................................................................6
III. Functions of CloudClass....................................................................................................7
a. Services of CloudClass:.........................................................................................7
IV. IT Environment of CloudClass:.........................................................................................8
a. Recording Equipment:...........................................................................................8
b. Office Equipment: .................................................................................................9
V. Integral Aspects of the Contingency Plan...........................................................................11
a. Critical Component Items: ..................................................................................11
b. Non Critical Component Item .............................................................................13
VI. IT Contingency Plan for CloudClass...............................................................................14
VII. IT Contingency Plan Budgeting ......................................................................................17
VIII. Contingency Plan Staff Training & Plan Testing ...........................................................18
IX. Contingency Plan Review Process ..................................................................................20
X. Conclusion...........................................................................................................................22
Works Cited .................................................................................................................................23
List of Tables ...............................................................................................................................24
List of Figures ..............................................................................................................................24
Appendix A..................................................................................................................................25
Page 5
I. Introduction
CloudClass is an online educational platform, much like Khan Academy and Coursera. Our
business works in collaboration the top universities of Bangladesh, to provide course lectures to
registered students only. We provide an alternative, online, method for university lectures,
which is especially required now due to the unavoidable political circumstances of Bangladesh,
which has completely disrupted the normal way of life. Although born of need, we do predict a
regular demand for online courses in future. Our domain is www.CloudClass.org.bd. A late
report by the U.S. Division of Education found that "classes with web learning (whether taught
totally online or mixed) by and large create stronger understudy learning results than do classes
with singularly eye to eye direction." Internet learning assumes a huge part in a deep rooted
training. Beside the traditional class lectures, a significant number of our collaborator
organizations are also utilizing our online stage to give their on-grounds understudies with an
enhanced learning knowledge. This mixed model of learning has demonstrated in studies to
build understudy engagement, participation and execution.
The purpose of this report is to develop an Information technology contingency plan for
CloudClass, in order to prepare the organization to react lucidly to an unplanned situation. The
report contains the business that is CloudClass, the importance of IT contingency plan. The
crucial components of CloudClass that can be under threat, our contingency plan, containing the
business process continuity, disaster recovery and incident management plans. In the review
process of the contingency plan we will have a quality controller who will weekly review the
whole process. Also, we will be having a precautionary measure to determine any possible
foreseen disaster. We have also figured a budget that could be required for the said contingency
plan as well as our planned staffing and training process for our employees, with regards to the
contingency plan.
Online Link for both report and video (Google Drive):
https://drive.google.com/open?id=0B_pM3ISxJIxkfmlrd0tIT0VvSHFKZ1FVaDZTV0w0MVV
4eGp0LUdFaWV3SFdXMEdON0I4Nk0&authuser=0
Page 6
II. IT Contingency Plan and Its Importance
In today’s world of terrorism, climate change, and an ever-increasing reliance upon Information
technology (IT), it is a vital requirement for any organization to have an IT contingency plan. The
time and money invested in developing and writing an IT contingency plan can pay enormous
dividends in the event of a major disaster. While a plan is good, it must be tested, revised as
necessary, and the people who use it must be trained. Perhaps one of the most important assets a
company has during a contingency is dedicated personnel who can solve problems not covered by
the IT contingency plan.
The National Institute of Standards and Technology states that, “IT contingency planning refers
to a coordinated strategy involving plans, procedures, and technical measures that enable the
recovery of IT systems, operations, and data after a disruption” (Swanson et al., 2002). In addition,
IT contingency planning should be part of a larger organization-wide contingency plan. The
definition of organizational contingency planning is: “A contingency plan is a comprehensive
statement of actions to be taken before, during, and after a disaster. A successful planning process
must achieve three goals: (1) create awareness of potential disasters, (2) define actions and activities
that will minimize disruptions of critical functions, and (3) develop the capability to reestablish
business operations.” (Sauter&Carafano, 2005)
IT Contingency Plan is important in order to ensure business continuity and availability of
critical resources during disasters; the plan should be documented and also tested in advance. This
will help expedite the process when the actual disaster or emergency strikes. The key to IT or
network disaster recovery is preparedness. Business vulnerabilities are ever increasing and every
organization is compelled to make appropriate disaster recovery plans and use advanced technology
to keep its network secure and stable. Network-reliant companies find it an absolute necessity to
frame disaster recovery policies and procedures to respond to the varied circumstances and
problems. Therefore the value of an IT contingency plan may seem obvious. And organizations are
more aware nowadays; for example, rapid actions taken by management of a major U.S. West
Coast bank whose headquarters was destroyed by a fire. Within a day they were able to resume
basic operations, and within a week resume all regular activities. This was made possible because
management had prepared a solid business continuity management program.
Page 7
III. Functions of CloudClass
CloudClass is a user-friendly interface which facilitates learning in the university level. The
domain of our website is www.CloudClass.org.bd. Our work is not to trade the classroom
experience for a virtual one; rather we aim to enhance the education system in Bangladesh.
a. Services of CloudClass:
 We provide faculties the platform for making video lectures and its supplements (PDFs,
Slides and subtitles), which our website uploads and maintains.
 Access to contents has filtered authorization as per the faculty’s opinion. Each lecturer
provides us their list of students, whom they want to show their video content to, and we
create authorized usernames and password for each of them, through Windows
Communication Foundation (WCF).
 Authorized students are able to stream and download the contents provided by their lecturer.
 Discussion boards are provided for each course, for students to interact with their
lecturer/TA and clear out their problems
 CloudClass is available as a website and as a Smartphone application, allowing students to
access and download items on the go.
 CloudClass provides Google calendar urls, which when added to one’s Google calendar
provides date and time notifications for assignment submissions/tests etc.
Page 8
IV. IT Environment of CloudClass:
CloudClass has an office in Niketon, with 10 soundproof recording rooms, working space for
the employees, a huge server room and a break lounge. Our website is made using the programming
language node.js, that fetches data fast and allows real-time streaming, and the compressing
software called grunt.js, for image and code compression, thus consuming very less space.
CloudClass would use OAuth2 protocol for user authentication and LTI. 1.1 protocols for
interaction with courses.
a. Recording Equipment:
 Input Equipment: Each of the soundproof rooms has a
glass board with a white background for lecturers to
write on. We use touch-screen monitors and graphics
tablets for digital input. If a faculty does not want to
show their face, they can use graphics tablet which
would have their writing digitalized on the computer
screen will be recorded along with the voice audio.
Figure 1: Glass Board Notes
 Video Equipment: Lectures are recorded with
standard digital single lens reflex video camera,
Canon 5D Mark II, one in each recording room.
 Lighting equipment: We have day-light colour balanced lighting system that diffuses the
light and avoids strong shadow. An example of our output is given in the picture to the right.
All lighting ideas were adapted from (Wiastia, 2006)--a learning platform.
 Sound Equipment: Each room has one microphone, a field mixer and an external capture
device for crystal clear audio recording. A mike in flexible boom will be attached for better
Page 9
sound recording. Two sound equipment sets are kept as a back- up, at all times. Professional
consultancy of sounding equipments was received from Julie Babcock and Dan Bruns of
Videomaker.
b. Office Equipment:
 Display: Dell LED monitors are used for exclusive clarity.
 Computers: Each employee is equipped with an Intel i5 2.5GHz, 4GB RAM, 320GB Hard
Drive, Windows 8 computer system for their work. We have 25 computer systems,
including back-ups.
 Data storage devices: For the storage of software programs, video contents, course database
along with students’ scores, assignments and discussion details and for rendering the page of
the website, we use solid state drive instead of hard-disk for our server. This provides better
reliability, fragmentation and access to change the form. Also all our data is stored on our
private company Google drive, our official cloud data storage and back-up system. Google
drive lets the employees work on different projects simultaneously.
 Web Server: we use server computers to control and run our website server. Disk mirroring
will be done with data will be duplicated in separate volumes on two drives to make the
storage more fault-tolerant. However, separate disks rely upon common controller; access to
both copies of data is threatened if the controller fails. Hence we would have 3 back-up
controllers as well. Coolers are kept to keep the server cold.
 Data Management System: To ensure better synchronization of the data, all the employees
will have to use the certain active directories, procedures and policies. Starting from writing
the name of each file correctly, right use of CC and BC, mailing students using mail merge
of Gmail, be able to use the admin console of Gmail properly ensuring utmost security and
the use of digital signature.
Page 10
 Network Components: For wireless internet, we would have a strong router to serve all of
our 23 employees and a broadband connection with high internet speed. Moreover, switches
and guards will be there as well. A router hub will be there to connect the computers to the
server so that each data stored in it can be accessed with any employee. As we have a server,
streaming devices can make the transfer of storage on cloud for our website users to watch
and download. Huge amount of cables will be needed. Various types as cable as such
coaxial, twisted-pair, sata, fibre will be used to satisfy different purposes.
 Software programs: For editing audio and video, we use Adobe Premium Pro, liteCam HD
and Camtasia Studio for screen recording in case the faculty does not want to be present in
the video. Firewalls are used to keep the website safe from virus, unauthorized access, pop-
ups and unwanted advertisements.
 Employees: We have 4 programmers, 3 web designers, 2 computer technicians, 5 video and
audio editors, 2 electrical and electronic engineers, 1 translator, 2 staff for cleaning and
serving coffee, 2 network engineers, for the maintenance and set up of the server and the
network components, and 4 co-founders, who make up the management team and
department heads of the company.
Page 11
V. Integral Aspects of the Contingency Plan
Disasters are unavoidable but mostly volatile, and they vary in type and extent. Every business
encounters disruption. The Table, below, depicts the threats most likely to impact the
CloudClass.org.bd and components of IT system. The specific threats that are represented by (XX)
are considered the most likely to occur within that environment.
Table 1: Risk Analysis Matrix
PROBABILITY OF THREATS
Probability of Occurrence: High Medium Low
Air Conditioning Failure X
Communications Loss X
Data Destruction X
Earthquakes X
Fire X
Flooding / Water Damage X
Power Loss / Outage XX
Vandalism / Rioting XX
Below are the key components of our business that would be affected by the above mentioned
threats, and thus require an IT contingency plan:
a. Critical Component Items:
1. Hardware- In our company, hardware includes the office itself, furniture, computer, large
screen display, video, lighting and sound equipment, etc. We are considering hardware as a
critical component of our organization because these resources can be inevitably affected by
natural disaster like earthquake and fire etc. Physical damage by natural disaster will destroy all
our office equipment. This also affects the power supply and severe data loss through physical
damage of the drives (IT Disaster Recovery, 2010). As a result, we will not be able to upload
our video contents or perform any other functions. Fire which is another natural disaster can
result in hardware meltdown, as well as with slag and smoke particles winding up between the
Page 12
read/compose leaders of the circle and the plate platter itself, will result in destruction.
Therefore, a contingency plan is absolutely required in case of catastrophe.
2. Data storage devices- Data constitute valuable organizational resources and it should be
managed effectively to benefit the organization. CloudClass is solely a confidential database
business. Without proper and secure database, our business will fail. Data storage is subject to
several threats that might result in total disruption of our work. For instance, data may get lost
during a system crash as a result of faulty drives or power failures or accidentally deleting or
overwriting files. Data might also be corrupted by computer viruses or stolen by hackers,
unauthorized users. Hence, in order to minimize the above mentioned risk and protect the
database, a back-up plan should be developed.
3. Network Components- Network plays an important role in interconnecting all the computers
and other communication devices. The most common problem that our network system might
experience is “server overload”. When data enters into the server at a greater rate than it can
load it causes a number of connection build up rapidly. Gradually, the server crosses the limit it
can handle and consequently get overloaded. So, if our server gets overloaded the clients will
not be able to access into the server and experience system crash, which would be just bad
business. The resulting disruption in the ease of website usage which will ruin the popularity of
our site and lessen the user rating.
4. Software- Software is a set of machine intelligible direction that coordinates a PCs processor to
perform particular operations. CloudClass.org.bd is a based-IT company. We rely on audio and
video editing software, network and database maintenance and cloud computing software
programs, heavily. So, the basic threat that we can encounter is the viral attack affecting our
software. The two most potential destructive viruses that can disrupt our software system are
listed below:
Page 13
 Code Red- Once infected, it will
continue to make a hundred duplicates of itself
yet because of a bug in the programming. As a
result, it will copy much more and winds up
consuming a ton of our system resource
(Jamaluddin, 2009)
Figure 2: Code-Red Virus Message
 Zeus- Zeus is a Trojan horse prepared to
infect Windows computers so that it can
execute various criminal tasks.
Figure 3: Virus Zeus Message
For all these above mentioned reasons we
need a pre-planned recovery process to cope up
with any sort of disaster that might affect our
business.
b. Non Critical ComponentItem
1. Employees: We are considering our employees as the non-critical item for our company. The
reason behind the fact is the close supervision and commitment of the employees. Human
resources are not critical because we can easily hire employees, since candidate number is
greater in comparison with job vacancy. In addition, if any employee leaves our organization we
have a thorough replacement process to fill that position. Still, a contingency plan is required
for training the newly recruited employees to produce an uninterrupted service.
Page 14
VI. IT Contingency Plan for CloudClass
After reviewing the components of our business that could be under a threat, we did a business
impact analysis, and a disaster recovery plan for these components, based on which we have built a
viable and strong contingency plan to prevail over any form of disruptions that might come our
way. Our contingency plan for each of the components at risk is detailed below:
1. Hardware: CloudClass has all its hardware equipment insured.
a. A preventive control is to store the server in a clean and cold room, as shown in figure 1.
One of the main job responsibilities of the staff is to maintain these two factors. Coolers
are installed in a server room to where the temperatures kept within 20-21 degree
Celsius, at all times.
Figure 4: Temperature Controlled Room
b. To avoid short-term power outage, we use generators to support our system and have
uninterrupted power supply to lessen system failures.
c. We have a standing order understanding with our video, lighting and sound equipment
suppliers, in case of calamity. And just in case required, we keep at least two back-up of
the entire recording system sets, at one of the founder’s house.
Page 15
2. Data storage devices: We already have our server class computer in place, with SSD for vast
data storage.
a. For our data back-up, we use http://www.opendrive.com cloud store. Opendrive is not
only one of the best cloud service available to business but also the most secure and
affordable cloud service present in the market (Dunn, 2014). Using cloud storage
provides our business not only with high remote and secure storage capacity but also
with additional features, such as deduplication which is a specialized data compression
technique that eliminates duplicate copies of redundant data, hence enables high data
efficiency (EMC Glossary). Cloud storage also helps enable remote access to data. And
also to ensure an additional level of data security and privacy, we use virtual private
network (VPN) for our collaborations and data backup processes (Diallo, 2014).
b. In case of natural calamities or vandalism or system failure we have the business
continuity plan in place. For the back-up of storage in case the entire office gets
destroyed all the content will be stored in large portable hard-disks which will be kept in
different locations. Disk mirroring will be done to make it feasible for the company to
sustain up-to-date copies of data in geographically dispersed locations, so that data
access can continue uninterrupted if one location is disabled.
3. Network Components: We have implemented the most logical and fail-safe solution to our
everyday networking system:
a. Cloud Hosting (Thoke). This means that we divide the resources required to run our
website over a cluster of web servers, CloudClass uses two web servers namely,
https://dhakawebhost.com/, and http://alpha.net.bd/. This allows us to easily manage
peak loads without losing any bandwidth. Thus making us impervious to server crash
and server overload disruptions.
b. Content delivery network (CDN) which will increase efficiency as it distributes the
static content of the website such as pictures and videos and puts them in location closer
to the people we are serving to. We would be using the Amazon CDN. Amazon servers
will cash our content to its servers and thus taking the load off our server and providing
faster usage for our website.
Page 16
4. Intellectual Property and Software Security:
a. Data theft is a major concern for CloudClass. Thus we have registered all our
intellectual property under the Main IP Laws: enacted by the Legislature, Copyright Act,
2000 (Act No. 28 of 2000, as amended up to 2005).
b. Also by implementing Kaspersky Total Security for Business, one of the world’s best
internet and antivirus security system (Rubenking, 2014), on our 25 computers our
company is virtually the safest it can be against all viruses and hackers. And in-case if
additional computers were introduced, we have Avast ProAntiVirus System as back-up.
5. Online Collaboration: CloudClass is a small business, consisting of 25 employees, of which
two are office boys. Our work is purely IT based and staff collaboration is of utmost
importance. Our 23 employees do not live in the same city, much less come to the office
regularly. Thus online collaboration is an integral part of running our business. We use Social
networks, such as Google hangouts, Facebook, Skype, Viber and Facetime, for staff interactions
and meetings (From example, see Appendix A). Our cloud service remote distance access
comes to work here as it enables us to share and work on business data, e.g. Course contents,
user information etc., in a secured platform.
6. Staffing: Having a set plan for staff hiring and training is essential for any business, be it for a
short-term inconvenience or a long term requirement. Thus it is explained in detail under “VIII.
Contingency Plan Testing & Staff Training” (page- 17)
Page 17
VII. IT Contingency Plan Budgeting
When it comes to setting up a contingency plan, it is essential to make a budget plan. This helps
to figure out from where to source the financing for a contingency plan. Even an estimated budget
is better than none. Our IT contingency plan budget consists of estimated numbers, which are
subjective to economical and market price changes. With that being said, the table below depicts
our contingency plan budget requirements.
Table 2: IT Contingency Plan Budget
Sl.
No.
Component Budgeted Requirement
1. Hardware Tk. 80,000
2. Cloud Server Tk. 20,000 per TB for a year
3. Network Server Tk. 10,000 per year
4. Antivirus and Internet Security Tk. 60,000 per year
5. Staffing and Training Process Tk. 25,000 per year
Our business is a website, which we cannot run without cloud and network server and security
already in place. Thus half the sums quoted here would be required for components 2, 3 and 4.
CloudClass is a profitable business with good financial record; thus we have a standing
understanding with our bank partner for instant credit loan in case of catastrophe.
Page 18
VIII. Contingency Plan Staff Training &
Plan Testing
A common theme throughout this is the importance of the people who execute a contingency
plan. Staffing contingency plans involve researching each project team members' experience and
how that affects the project. By knowing who has specific educational and work experience, you
can make better decisions about the contingency plans and suitable staff replacements. If there's
enough time, potential replacements can be trained so that they have the same or similar knowledge
as the person who is no longer on the project. All staff should be thoroughly trained in their roles,
duties and responsibilities; more intense training will need to be given to those who will be in key
positions.
Training for personnel with contingency plan responsibilities should complement
testing. Therefore training will be provided at least annually; new hires with plan responsibilities
should receive training shortly after they are hired. Ultimately, all personnel involved will be
trained to the extent that they are able to execute their respective recovery procedures without aid of
the actual guide. Therefore, personnel would be trained on the following plan elements:
 Cross-team coordination and communication
 Reporting procedures
 Security requirements
 Team-specific processes
 Individual responsibilities
Contingency Plan Testing Process:
The IT contingency plan must work when needed; finding out that it does not work during an
emergency is much too late. Plan testing, training, and exercises will help to establish the viability
of the organizations IT contingency plan. Plan testing will discover holes in the plan that must be
fixed, or identify procedures that seem simple on paper, but are complex in execution.
There are several methods for testing and/or exercising contingency plans to identify potential
weaknesses. Contingency plan testing and/or exercises include a determination of the effects on
Page 19
organizational operations and assets (e.g., reduction in mission capability) and individuals arising
due to contingency operations in accordance with the plan.
Since there are many aspects of an IT environment to be tested, there are different kinds of tests
to be initiated. There are four basic tests to do that:
1. Walk – Through: Basic disaster recovery testing begins with a desktop walk-through activity, in
which team members review plans step by step to see if they make sense and to fully understand
their roles and responsibilities. Walkthroughs, workshops and orientation seminars are basic
training for team members. They are designed to familiarize team members with emergency
response, business continuity and crisis communications plans and their roles and
responsibilities as defined in the plans.
2. Simulated Recovery: The next kind of test, a simulated recovery, impacts specific systems and
infrastructure elements. Specifically, tests such as failover and failback of critical servers are
among the most frequently conducted. These tests not only verify the recoverability of primary
and backup servers but also the network infrastructure that supports the failover/failback and the
specialized applications that effect failover and failback.
3. Operational exercises: These extend the simulated recovery test to a wider scale, typically
testing end-to-end recovery of multiple systems, both internal and external, the associated
network infrastructures that support connectivity of those assets, and the facilities that house
primary and backup systems. These tests are highly complex, and provide a higher level of risk
compared to other tests, as multiple systems will be affected. Loss of one or more critical
systems from this kind of test could result in a serious disruption to the organization.
4. Table – Top Exercises: Tabletop exercises are discussion-based sessions where team members
meet in an informal, classroom setting to discuss their roles during an emergency and their
responses to a particular emergency situation. A facilitator guides participants through a
discussion of one or more scenarios. The duration of a tabletop exercise depends on the
audience, the topic being exercised and the exercise objectives. Many tabletop exercises can be
conducted in a few hours, so they are cost-effective tools to validate plans and capabilities.
Page 20
IX. Contingency Plan Review Process
A Contingency plan review process is defined as an action that recognizes, investigates and
enhances existing techniques inside an association in order to meet the goals and objectives of an
organization.
In the review process we will check the standard of our contingency planning. The contingency
plan should be practical and flexible. We will make the plan modest and easy therefore all the staff
and communal members will be able to participate and exploit the benefit for our company. We will
ensure the effective and efficient use of our resources. The review process consists of two factors:
1. Standard Operating Procedures (SOPs): We developed a Standard Operating Procedure
(SOP) in order to assist the individual with information required to carry out their particular
task. It also assists our company to maintain in the quality control process within the
organization. It also provides comprehensive description of the work instruction which will
decrease miscommunication (Goolaup, 2011).
2. Core Contingency Planning Team (CT): In order to maintain proper monitoring of our IT
contingency plan we developed a Core Contingency Planning Team (CT). The CT consists
of three to five individuals who are responsible for the entire process. This obligation is
reflected in sets of responsibilities also internal working strategies, so that sufficient time is
allotted to empower the CT to work frequently on possibility arranging, readiness and limit
building (Choularton, 2007).
Our contingency plan review process feasibility test has to follow these four steps (as shown in
figure):
Step-1: Determining our contingency plan and objectives
Step-2: Evaluating options, vendors and planning design
Step-3: Reviewing plan investment options and providing fee benchmarking
Step-4: Completing due diligence review and document results
In order to maintain proper monitoring of our IT contingency plan, our CT will monitor and
control the review process steps. We will monitor and test the plan on a regular basis using table-
top exercises.
Page 21
Figure 5: Review Process
Table-top exercise is a simple table-top exercise is a facilitated analysis of an emergency
situation in an informal, stress-free environment. It is intended to evoke valuable examination as
members look at and resolve issues taking into account existing operational plans and distinguish
where those arrangements need to be refined. There is insignificant attempt at recreation in a
tabletop exercise. Since, supplies are not utilized, assets are not conveyed, and time weights are not
presented it will help us to test the capability of our company to respond to a virtual event (Select
Your Exercise)
The contingency planning process does not end with the creation of an arrangement. It is
especially vital that the arrangement be altogether assessed when there is a change in the
circumstance or a change in the institutional environment, for example, a noteworthy change in
participation or administration of the group/division. Therefore, the process should be persistent and
we must review and modernize the plan on a regular basis.
Page 22
X. Conclusion
An automobile is made up of many pieces. Every piece plays a function to keep it running; one
little disjointed piece can bring about a total shutdown of the vehicle. A business is like a well oiled
automobile, every component counts. Thus to ensure long, effective and successful business it is a
smart decision to have contingency plans in place.
In this report we have talked about the IT contingency plans of CloudClass in simple concise
details. We believe that with the steps we have taken, as described throughout the report, will
ensure a long, effective and successful business. We believe that the above mentioned IT
contingency plan, steps and procedures as described in the report, will enable our organization to
have faster response for any disruptions, to minimize risk exposure, to ensure proper business
functioning and to ensure the continuity of our business, even at the face of any disaster.
Page 23
Works Cited
1. Choularton, R. (2007, March). Retrieved March 04, 2015, from Humanitarian Practice Network
Website:
http://www.odihpn.org/index.php?option=com_k2&view=item&layout=item&id=2868
2. Diallo, A. (2014, August 06). Three Ways To Protect Yourself From Hackers. Retrieved from
Forbes: http://www.forbes.com/sites/amadoudiallo/2014/08/06/three-ways-to-protect-yourself-
from-hackers/
3. Dunn, K. (2014). 2015 Best Business Cloud Storage Services. Retrieved March 01, 2015, from
Top Ten Reviews: http://business-cloud-storage-services.toptenreviews.com/
4. EGOL. (2006, Oct. 20). A Contingency Plan for your Web-Based Business. Retrieved March
01, 2015, from The Moz Blog: http://moz.com/blog/a-contingency-plan-for-your-webbased-
business
5. EMC Glossary. (n.d.). Retrieved March 03, 2015, from EMC Website:
http://www.emc.com/corporate/glossary/data-deduplication.htm
6. Goolaup, P. (2011). Preparing For Severe Weather Emergencies . Retrieved March 04, 2015,
from Mauritius Mateorological Services:
http://www.liv.ac.uk/media/livacuk/schoolofmanagement/docs/ethnographypapers2014/Liberati
_Scaratti.pdf
7. IT Disaster Recovery. (2010, March 12). Retrieved 03 01, 2015, from Respond to Disaster
website: http://www.respondtodisaster.org/it-disaster-recovery.htm
8. Jamaluddin, A. (2009). 10 Most Destructive Computer Viruses. Retrieved Feb. 28, 2015, from
Hongkiat.com: http://www.hongkiat.com/blog/famous-malicious-computer-viruses/
9. Rubenking, N. J. (2014, November 26). The Best Antivirus for 2015. Retrieved March 02, 2015,
from PC Magaznie: http://www.pcmag.com/article2/0,2817,2372364,00.asp
10. Select Your Exercise. (n.d.). Retrieved March 04, 2015, from Emergency Response Tabletop
Exercises: http://www.epa.gov/watersecurity/tools/trainingcd/Pages/exercise-menu.html
11. Thoke, O. (n.d.). Understanding What Cloud Hosting Really Is! Retrieved March 02, 2015,
from About Tech Website: http://webhosting.about.com/od/Clouding-Hosting/a/What-Is-Cloud-
Hosting-And-Should-You-Consider-It.htm
12. Wiastia. (2006). Retrieved February 20, 2015, from Wistia.com: http://wistia.com/blog
Page 24
List of Tables
Table 1: Risk Analysis Matrix ..................................................................................................11
Table 2: IT Contingency Plan Budget .........................................................................................17
List of Figures
Figure 1: Glass Board Notes ..........................................................................................................8
Figure 2: Code-Red Virus Message.............................................................................................13
Figure 3: Virus Zeus Message .....................................................................................................13
Figure 4: Temperature Controlled Room.....................................................................................14
Figure 5: Review Process.............................................................................................................21
Page 25
Appendix A
Our group consists of four members. Due to political unrest, we did not have much of face-to-
face meet-ups. We mostly worked and interacted through online communication. Along with
talking over the phone, we used Skype for video conferences, we created a Facebook group for
regular idea and article discussion and finally we used Google drive to store all the data articles we
collected to help each other and to shared our term paper write up files and videos. Screen Shots of
our FB group and Google Drive Folder is shared below:

More Related Content

Viewers also liked

DEV101-- Industrial Sector of Bangladesh--term paper
DEV101-- Industrial Sector of Bangladesh--term paperDEV101-- Industrial Sector of Bangladesh--term paper
DEV101-- Industrial Sector of Bangladesh--term paperSamiya Yesmin
 
Dev101 farik sannyasi resistance
Dev101 farik sannyasi resistanceDev101 farik sannyasi resistance
Dev101 farik sannyasi resistanceSamiya Yesmin
 
HUM103- Human rights and morality--presentation
HUM103- Human rights and morality--presentationHUM103- Human rights and morality--presentation
HUM103- Human rights and morality--presentationSamiya Yesmin
 
Bus 203 group 4- unemployment and its consequences
Bus 203  group 4-  unemployment and its consequencesBus 203  group 4-  unemployment and its consequences
Bus 203 group 4- unemployment and its consequencesSamiya Yesmin
 
MGT301--assignment 01--Line Managers
MGT301--assignment 01--Line ManagersMGT301--assignment 01--Line Managers
MGT301--assignment 01--Line ManagersSamiya Yesmin
 
BTE101- Industrial biotechnology
BTE101- Industrial biotechnologyBTE101- Industrial biotechnology
BTE101- Industrial biotechnologySamiya Yesmin
 
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)Samiya Yesmin
 
MSC301- The Impact of Change in Oil Price (PPT)
MSC301- The Impact of Change in Oil Price (PPT)MSC301- The Impact of Change in Oil Price (PPT)
MSC301- The Impact of Change in Oil Price (PPT)Samiya Yesmin
 
BUS101 Case study--Katrina's Aftermath
BUS101 Case study--Katrina's AftermathBUS101 Case study--Katrina's Aftermath
BUS101 Case study--Katrina's AftermathSamiya Yesmin
 
MKT201--assignment 1--concepts of Marketing
MKT201--assignment 1--concepts of MarketingMKT201--assignment 1--concepts of Marketing
MKT201--assignment 1--concepts of MarketingSamiya Yesmin
 
Stat 101 formulae sheet
Stat 101   formulae sheetStat 101   formulae sheet
Stat 101 formulae sheetSamiya Yesmin
 
BUS203---term ppr--unemployement and its consequences
BUS203---term ppr--unemployement and its consequences BUS203---term ppr--unemployement and its consequences
BUS203---term ppr--unemployement and its consequences Samiya Yesmin
 
BUS202 Business Assignment--
BUS202 Business Assignment--BUS202 Business Assignment--
BUS202 Business Assignment--Samiya Yesmin
 
MKT201--term paper--Research on Customer Citizenship Behaviour
MKT201--term paper--Research on Customer Citizenship Behaviour MKT201--term paper--Research on Customer Citizenship Behaviour
MKT201--term paper--Research on Customer Citizenship Behaviour Samiya Yesmin
 
MSC301- The Impact of Change in Oil Price
MSC301- The Impact of Change in Oil Price MSC301- The Impact of Change in Oil Price
MSC301- The Impact of Change in Oil Price Samiya Yesmin
 
MGT211 term paper--Management Planning of Nescafé
MGT211 term paper--Management Planning of NescaféMGT211 term paper--Management Planning of Nescafé
MGT211 term paper--Management Planning of NescaféSamiya Yesmin
 

Viewers also liked (17)

DEV101-- Industrial Sector of Bangladesh--term paper
DEV101-- Industrial Sector of Bangladesh--term paperDEV101-- Industrial Sector of Bangladesh--term paper
DEV101-- Industrial Sector of Bangladesh--term paper
 
Dev101 farik sannyasi resistance
Dev101 farik sannyasi resistanceDev101 farik sannyasi resistance
Dev101 farik sannyasi resistance
 
HUM103- Human rights and morality--presentation
HUM103- Human rights and morality--presentationHUM103- Human rights and morality--presentation
HUM103- Human rights and morality--presentation
 
Bus 203 group 4- unemployment and its consequences
Bus 203  group 4-  unemployment and its consequencesBus 203  group 4-  unemployment and its consequences
Bus 203 group 4- unemployment and its consequences
 
MGT301--assignment 01--Line Managers
MGT301--assignment 01--Line ManagersMGT301--assignment 01--Line Managers
MGT301--assignment 01--Line Managers
 
BTE101- Industrial biotechnology
BTE101- Industrial biotechnologyBTE101- Industrial biotechnology
BTE101- Industrial biotechnology
 
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)
BUS301: Group 4 - RahimAfrooz Globatt Limited (RGL)
 
MSC301- The Impact of Change in Oil Price (PPT)
MSC301- The Impact of Change in Oil Price (PPT)MSC301- The Impact of Change in Oil Price (PPT)
MSC301- The Impact of Change in Oil Price (PPT)
 
BUS101 Case study--Katrina's Aftermath
BUS101 Case study--Katrina's AftermathBUS101 Case study--Katrina's Aftermath
BUS101 Case study--Katrina's Aftermath
 
MKT201--assignment 1--concepts of Marketing
MKT201--assignment 1--concepts of MarketingMKT201--assignment 1--concepts of Marketing
MKT201--assignment 1--concepts of Marketing
 
Stat 101 formulae sheet
Stat 101   formulae sheetStat 101   formulae sheet
Stat 101 formulae sheet
 
BUS203---term ppr--unemployement and its consequences
BUS203---term ppr--unemployement and its consequences BUS203---term ppr--unemployement and its consequences
BUS203---term ppr--unemployement and its consequences
 
BUS202 Business Assignment--
BUS202 Business Assignment--BUS202 Business Assignment--
BUS202 Business Assignment--
 
The Saudi Riyal
The Saudi RiyalThe Saudi Riyal
The Saudi Riyal
 
MKT201--term paper--Research on Customer Citizenship Behaviour
MKT201--term paper--Research on Customer Citizenship Behaviour MKT201--term paper--Research on Customer Citizenship Behaviour
MKT201--term paper--Research on Customer Citizenship Behaviour
 
MSC301- The Impact of Change in Oil Price
MSC301- The Impact of Change in Oil Price MSC301- The Impact of Change in Oil Price
MSC301- The Impact of Change in Oil Price
 
MGT211 term paper--Management Planning of Nescafé
MGT211 term paper--Management Planning of NescaféMGT211 term paper--Management Planning of Nescafé
MGT211 term paper--Management Planning of Nescafé
 

Similar to Cloud Class

Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMWajahat Ali Khan
 
IRJET- E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...
IRJET-  	  E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...IRJET-  	  E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...
IRJET- E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...IRJET Journal
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recrosu555
 
A Proposed Model for IT Disaster Recovery Plan
A Proposed Model for IT Disaster Recovery PlanA Proposed Model for IT Disaster Recovery Plan
A Proposed Model for IT Disaster Recovery PlanHossam Al-Ansary
 
A Proposed Model For IT Disaster Recovery Plan
A Proposed Model For IT Disaster Recovery PlanA Proposed Model For IT Disaster Recovery Plan
A Proposed Model For IT Disaster Recovery PlanHeather Strinden
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 SoetamSoetam Rizky
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment planSafwan Hashmi
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfSysvoot Antivirus
 
Development Of Practice Management Software Essay
Development Of Practice Management Software EssayDevelopment Of Practice Management Software Essay
Development Of Practice Management Software EssaySherry Bailey
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingenciesHassanein Alwan
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxanhlodge
 
DS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS
 
Section 1 describe the process (steps) you would use in any organiz
Section 1 describe the process (steps) you would use in any organizSection 1 describe the process (steps) you would use in any organiz
Section 1 describe the process (steps) you would use in any organizSHIVA101531
 
Preservation Section Disaster Planning Presentation (SAA 2010)
Preservation Section Disaster Planning Presentation (SAA 2010)Preservation Section Disaster Planning Presentation (SAA 2010)
Preservation Section Disaster Planning Presentation (SAA 2010)Lance Stuchell
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity CapabilityRod Davis
 
Pertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery planPertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery plannewbie2019
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpointLonda77
 

Similar to Cloud Class (20)

Contingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATMContingency Plan WAK BANKS ATM
Contingency Plan WAK BANKS ATM
 
IRJET- E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...
IRJET-  	  E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...IRJET-  	  E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...
IRJET- E-Krisenseva: A Web-App based Portal for Real Time Disaster Manage...
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
A Proposed Model for IT Disaster Recovery Plan
A Proposed Model for IT Disaster Recovery PlanA Proposed Model for IT Disaster Recovery Plan
A Proposed Model for IT Disaster Recovery Plan
 
A Proposed Model For IT Disaster Recovery Plan
A Proposed Model For IT Disaster Recovery PlanA Proposed Model For IT Disaster Recovery Plan
A Proposed Model For IT Disaster Recovery Plan
 
20180430 csirt eng
20180430 csirt eng20180430 csirt eng
20180430 csirt eng
 
Forkomil 2009 Soetam
Forkomil 2009 SoetamForkomil 2009 Soetam
Forkomil 2009 Soetam
 
Incident managment plan
Incident managment planIncident managment plan
Incident managment plan
 
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdfHow to Make an Effective Cloud Disaster Recovery Strategy.pdf
How to Make an Effective Cloud Disaster Recovery Strategy.pdf
 
Development Of Practice Management Software Essay
Development Of Practice Management Software EssayDevelopment Of Practice Management Software Essay
Development Of Practice Management Software Essay
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingencies
 
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docxRUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
RUNNING HEADER Disaster Recovery Plan Information and Documentat.docx
 
DS Crisis Management Foundation Introduction
DS Crisis Management Foundation IntroductionDS Crisis Management Foundation Introduction
DS Crisis Management Foundation Introduction
 
Section 1 describe the process (steps) you would use in any organiz
Section 1 describe the process (steps) you would use in any organizSection 1 describe the process (steps) you would use in any organiz
Section 1 describe the process (steps) you would use in any organiz
 
Preservation Section Disaster Planning Presentation (SAA 2010)
Preservation Section Disaster Planning Presentation (SAA 2010)Preservation Section Disaster Planning Presentation (SAA 2010)
Preservation Section Disaster Planning Presentation (SAA 2010)
 
Disaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an EmergencyDisaster Recovery: Develop Efficient Critique for an Emergency
Disaster Recovery: Develop Efficient Critique for an Emergency
 
Building a Business Continuity Capability
Building a Business Continuity CapabilityBuilding a Business Continuity Capability
Building a Business Continuity Capability
 
Pertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery planPertemuan 15 disaster recovery plan
Pertemuan 15 disaster recovery plan
 
Blog powerpoint
Blog powerpointBlog powerpoint
Blog powerpoint
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Cloud Class

  • 2. Page 1 Group Project by: Team Awesomeness Sl. Name I.D. Signatures 1 Samiya Yesmin 11304043 2 Protiti Khan 11304018 3 Tanzeela Rahman 12304005 4 Upama Sarkar Borna 12104034 CSE371: Management information System Course Instructor: Mr. Syed Mahmudur Rahman Section 03 15/03/2015
  • 3. Page 2 Acknowledgements Group 1: Awesomeness Sl. Name I.D. Individual Contribution 1 Samiya Yesmin 11304043 Team Leader, Report organizer and editor. VI. IT Contingency Plan for CloudClass VII. Budgeting X. Conclusion 2 Protiti Khan 11304018 Executive Summary II. IT Contingency Plan and its importance VIII. Contingency Staff Training and Plan Testing 3 Tanzeela Rahman 12304005 Logo Design and Presentation Slide. III. Functions of CloudClass IV. IT Environment of Cloud Class VI. IT Contingency Plan for CloudClass (Hardware) 4 Upama Sarkar Borna 12104034 I. Introduction V. Integral Aspects of the Contingency Plan IX. Contingency Plan Review Process The video presentation was a joint effort of the entire team. Disclaimer www.CloudClass.org.bd is a business idea of its co-authors and is not-yet a factual business. The co-authors acknowledge the trademarked status and trademark owners of the following word marks mentioned in this paper: Khan Academy, Coursera.org, Google, Facebook, OpenDrive, Adobe Premium Pro, liteCamHD, Cannon, Dell, Camtasia Studio, Dhaka Web Host.com, Alpha.net.bd/, Avast Antivirus, Kaspersky Security, Skype, Facetime and Viber.
  • 4. Page 3 Executive Summary Natural disasters, terrorist acts, large-scale accidents, and cyber-attacks all have the potential to cause a catastrophic loss of information technology systems and infrastructure. In the event of such an outage, it is vital for organizations to ensure their business processes which are vital to the mission and survival of the organization, continue. CloudClass.org.bd is a business that works with the top universities of Bangladesh, to provide online course lectures as an alternative method to registered students. The purpose of this report is to develop an Information technology contingency plan for CloudClass.org.bd, in order to prepare the organization to react lucidly to an unplanned situation. The report contains the business that is CloudClass.org.bd, the importance of IT contingency plan. the crucial components of CloudClass that can be under threat, our contingency plan, containing the business process continuity, disaster recovery and incident management plans. In the review process of the contingency plan we will have a quality controller who will weekly review the whole process. Also, we will be having a precautionary measure to determine any possible foreseen disaster. We have also figured a budget that could be required for the said contingency plan as well as our planned staffing and training process for our employees, with regards to the contingency plan.
  • 5. Page 4 Table of Contents Acknowledgements........................................................................................................................2 Disclaimer ......................................................................................................................................2 Executive Summary.......................................................................................................................3 I. Introduction...........................................................................................................................5 II. IT Contingency Plan and Its Importance...............................................................................6 III. Functions of CloudClass....................................................................................................7 a. Services of CloudClass:.........................................................................................7 IV. IT Environment of CloudClass:.........................................................................................8 a. Recording Equipment:...........................................................................................8 b. Office Equipment: .................................................................................................9 V. Integral Aspects of the Contingency Plan...........................................................................11 a. Critical Component Items: ..................................................................................11 b. Non Critical Component Item .............................................................................13 VI. IT Contingency Plan for CloudClass...............................................................................14 VII. IT Contingency Plan Budgeting ......................................................................................17 VIII. Contingency Plan Staff Training & Plan Testing ...........................................................18 IX. Contingency Plan Review Process ..................................................................................20 X. Conclusion...........................................................................................................................22 Works Cited .................................................................................................................................23 List of Tables ...............................................................................................................................24 List of Figures ..............................................................................................................................24 Appendix A..................................................................................................................................25
  • 6. Page 5 I. Introduction CloudClass is an online educational platform, much like Khan Academy and Coursera. Our business works in collaboration the top universities of Bangladesh, to provide course lectures to registered students only. We provide an alternative, online, method for university lectures, which is especially required now due to the unavoidable political circumstances of Bangladesh, which has completely disrupted the normal way of life. Although born of need, we do predict a regular demand for online courses in future. Our domain is www.CloudClass.org.bd. A late report by the U.S. Division of Education found that "classes with web learning (whether taught totally online or mixed) by and large create stronger understudy learning results than do classes with singularly eye to eye direction." Internet learning assumes a huge part in a deep rooted training. Beside the traditional class lectures, a significant number of our collaborator organizations are also utilizing our online stage to give their on-grounds understudies with an enhanced learning knowledge. This mixed model of learning has demonstrated in studies to build understudy engagement, participation and execution. The purpose of this report is to develop an Information technology contingency plan for CloudClass, in order to prepare the organization to react lucidly to an unplanned situation. The report contains the business that is CloudClass, the importance of IT contingency plan. The crucial components of CloudClass that can be under threat, our contingency plan, containing the business process continuity, disaster recovery and incident management plans. In the review process of the contingency plan we will have a quality controller who will weekly review the whole process. Also, we will be having a precautionary measure to determine any possible foreseen disaster. We have also figured a budget that could be required for the said contingency plan as well as our planned staffing and training process for our employees, with regards to the contingency plan. Online Link for both report and video (Google Drive): https://drive.google.com/open?id=0B_pM3ISxJIxkfmlrd0tIT0VvSHFKZ1FVaDZTV0w0MVV 4eGp0LUdFaWV3SFdXMEdON0I4Nk0&authuser=0
  • 7. Page 6 II. IT Contingency Plan and Its Importance In today’s world of terrorism, climate change, and an ever-increasing reliance upon Information technology (IT), it is a vital requirement for any organization to have an IT contingency plan. The time and money invested in developing and writing an IT contingency plan can pay enormous dividends in the event of a major disaster. While a plan is good, it must be tested, revised as necessary, and the people who use it must be trained. Perhaps one of the most important assets a company has during a contingency is dedicated personnel who can solve problems not covered by the IT contingency plan. The National Institute of Standards and Technology states that, “IT contingency planning refers to a coordinated strategy involving plans, procedures, and technical measures that enable the recovery of IT systems, operations, and data after a disruption” (Swanson et al., 2002). In addition, IT contingency planning should be part of a larger organization-wide contingency plan. The definition of organizational contingency planning is: “A contingency plan is a comprehensive statement of actions to be taken before, during, and after a disaster. A successful planning process must achieve three goals: (1) create awareness of potential disasters, (2) define actions and activities that will minimize disruptions of critical functions, and (3) develop the capability to reestablish business operations.” (Sauter&Carafano, 2005) IT Contingency Plan is important in order to ensure business continuity and availability of critical resources during disasters; the plan should be documented and also tested in advance. This will help expedite the process when the actual disaster or emergency strikes. The key to IT or network disaster recovery is preparedness. Business vulnerabilities are ever increasing and every organization is compelled to make appropriate disaster recovery plans and use advanced technology to keep its network secure and stable. Network-reliant companies find it an absolute necessity to frame disaster recovery policies and procedures to respond to the varied circumstances and problems. Therefore the value of an IT contingency plan may seem obvious. And organizations are more aware nowadays; for example, rapid actions taken by management of a major U.S. West Coast bank whose headquarters was destroyed by a fire. Within a day they were able to resume basic operations, and within a week resume all regular activities. This was made possible because management had prepared a solid business continuity management program.
  • 8. Page 7 III. Functions of CloudClass CloudClass is a user-friendly interface which facilitates learning in the university level. The domain of our website is www.CloudClass.org.bd. Our work is not to trade the classroom experience for a virtual one; rather we aim to enhance the education system in Bangladesh. a. Services of CloudClass:  We provide faculties the platform for making video lectures and its supplements (PDFs, Slides and subtitles), which our website uploads and maintains.  Access to contents has filtered authorization as per the faculty’s opinion. Each lecturer provides us their list of students, whom they want to show their video content to, and we create authorized usernames and password for each of them, through Windows Communication Foundation (WCF).  Authorized students are able to stream and download the contents provided by their lecturer.  Discussion boards are provided for each course, for students to interact with their lecturer/TA and clear out their problems  CloudClass is available as a website and as a Smartphone application, allowing students to access and download items on the go.  CloudClass provides Google calendar urls, which when added to one’s Google calendar provides date and time notifications for assignment submissions/tests etc.
  • 9. Page 8 IV. IT Environment of CloudClass: CloudClass has an office in Niketon, with 10 soundproof recording rooms, working space for the employees, a huge server room and a break lounge. Our website is made using the programming language node.js, that fetches data fast and allows real-time streaming, and the compressing software called grunt.js, for image and code compression, thus consuming very less space. CloudClass would use OAuth2 protocol for user authentication and LTI. 1.1 protocols for interaction with courses. a. Recording Equipment:  Input Equipment: Each of the soundproof rooms has a glass board with a white background for lecturers to write on. We use touch-screen monitors and graphics tablets for digital input. If a faculty does not want to show their face, they can use graphics tablet which would have their writing digitalized on the computer screen will be recorded along with the voice audio. Figure 1: Glass Board Notes  Video Equipment: Lectures are recorded with standard digital single lens reflex video camera, Canon 5D Mark II, one in each recording room.  Lighting equipment: We have day-light colour balanced lighting system that diffuses the light and avoids strong shadow. An example of our output is given in the picture to the right. All lighting ideas were adapted from (Wiastia, 2006)--a learning platform.  Sound Equipment: Each room has one microphone, a field mixer and an external capture device for crystal clear audio recording. A mike in flexible boom will be attached for better
  • 10. Page 9 sound recording. Two sound equipment sets are kept as a back- up, at all times. Professional consultancy of sounding equipments was received from Julie Babcock and Dan Bruns of Videomaker. b. Office Equipment:  Display: Dell LED monitors are used for exclusive clarity.  Computers: Each employee is equipped with an Intel i5 2.5GHz, 4GB RAM, 320GB Hard Drive, Windows 8 computer system for their work. We have 25 computer systems, including back-ups.  Data storage devices: For the storage of software programs, video contents, course database along with students’ scores, assignments and discussion details and for rendering the page of the website, we use solid state drive instead of hard-disk for our server. This provides better reliability, fragmentation and access to change the form. Also all our data is stored on our private company Google drive, our official cloud data storage and back-up system. Google drive lets the employees work on different projects simultaneously.  Web Server: we use server computers to control and run our website server. Disk mirroring will be done with data will be duplicated in separate volumes on two drives to make the storage more fault-tolerant. However, separate disks rely upon common controller; access to both copies of data is threatened if the controller fails. Hence we would have 3 back-up controllers as well. Coolers are kept to keep the server cold.  Data Management System: To ensure better synchronization of the data, all the employees will have to use the certain active directories, procedures and policies. Starting from writing the name of each file correctly, right use of CC and BC, mailing students using mail merge of Gmail, be able to use the admin console of Gmail properly ensuring utmost security and the use of digital signature.
  • 11. Page 10  Network Components: For wireless internet, we would have a strong router to serve all of our 23 employees and a broadband connection with high internet speed. Moreover, switches and guards will be there as well. A router hub will be there to connect the computers to the server so that each data stored in it can be accessed with any employee. As we have a server, streaming devices can make the transfer of storage on cloud for our website users to watch and download. Huge amount of cables will be needed. Various types as cable as such coaxial, twisted-pair, sata, fibre will be used to satisfy different purposes.  Software programs: For editing audio and video, we use Adobe Premium Pro, liteCam HD and Camtasia Studio for screen recording in case the faculty does not want to be present in the video. Firewalls are used to keep the website safe from virus, unauthorized access, pop- ups and unwanted advertisements.  Employees: We have 4 programmers, 3 web designers, 2 computer technicians, 5 video and audio editors, 2 electrical and electronic engineers, 1 translator, 2 staff for cleaning and serving coffee, 2 network engineers, for the maintenance and set up of the server and the network components, and 4 co-founders, who make up the management team and department heads of the company.
  • 12. Page 11 V. Integral Aspects of the Contingency Plan Disasters are unavoidable but mostly volatile, and they vary in type and extent. Every business encounters disruption. The Table, below, depicts the threats most likely to impact the CloudClass.org.bd and components of IT system. The specific threats that are represented by (XX) are considered the most likely to occur within that environment. Table 1: Risk Analysis Matrix PROBABILITY OF THREATS Probability of Occurrence: High Medium Low Air Conditioning Failure X Communications Loss X Data Destruction X Earthquakes X Fire X Flooding / Water Damage X Power Loss / Outage XX Vandalism / Rioting XX Below are the key components of our business that would be affected by the above mentioned threats, and thus require an IT contingency plan: a. Critical Component Items: 1. Hardware- In our company, hardware includes the office itself, furniture, computer, large screen display, video, lighting and sound equipment, etc. We are considering hardware as a critical component of our organization because these resources can be inevitably affected by natural disaster like earthquake and fire etc. Physical damage by natural disaster will destroy all our office equipment. This also affects the power supply and severe data loss through physical damage of the drives (IT Disaster Recovery, 2010). As a result, we will not be able to upload our video contents or perform any other functions. Fire which is another natural disaster can result in hardware meltdown, as well as with slag and smoke particles winding up between the
  • 13. Page 12 read/compose leaders of the circle and the plate platter itself, will result in destruction. Therefore, a contingency plan is absolutely required in case of catastrophe. 2. Data storage devices- Data constitute valuable organizational resources and it should be managed effectively to benefit the organization. CloudClass is solely a confidential database business. Without proper and secure database, our business will fail. Data storage is subject to several threats that might result in total disruption of our work. For instance, data may get lost during a system crash as a result of faulty drives or power failures or accidentally deleting or overwriting files. Data might also be corrupted by computer viruses or stolen by hackers, unauthorized users. Hence, in order to minimize the above mentioned risk and protect the database, a back-up plan should be developed. 3. Network Components- Network plays an important role in interconnecting all the computers and other communication devices. The most common problem that our network system might experience is “server overload”. When data enters into the server at a greater rate than it can load it causes a number of connection build up rapidly. Gradually, the server crosses the limit it can handle and consequently get overloaded. So, if our server gets overloaded the clients will not be able to access into the server and experience system crash, which would be just bad business. The resulting disruption in the ease of website usage which will ruin the popularity of our site and lessen the user rating. 4. Software- Software is a set of machine intelligible direction that coordinates a PCs processor to perform particular operations. CloudClass.org.bd is a based-IT company. We rely on audio and video editing software, network and database maintenance and cloud computing software programs, heavily. So, the basic threat that we can encounter is the viral attack affecting our software. The two most potential destructive viruses that can disrupt our software system are listed below:
  • 14. Page 13  Code Red- Once infected, it will continue to make a hundred duplicates of itself yet because of a bug in the programming. As a result, it will copy much more and winds up consuming a ton of our system resource (Jamaluddin, 2009) Figure 2: Code-Red Virus Message  Zeus- Zeus is a Trojan horse prepared to infect Windows computers so that it can execute various criminal tasks. Figure 3: Virus Zeus Message For all these above mentioned reasons we need a pre-planned recovery process to cope up with any sort of disaster that might affect our business. b. Non Critical ComponentItem 1. Employees: We are considering our employees as the non-critical item for our company. The reason behind the fact is the close supervision and commitment of the employees. Human resources are not critical because we can easily hire employees, since candidate number is greater in comparison with job vacancy. In addition, if any employee leaves our organization we have a thorough replacement process to fill that position. Still, a contingency plan is required for training the newly recruited employees to produce an uninterrupted service.
  • 15. Page 14 VI. IT Contingency Plan for CloudClass After reviewing the components of our business that could be under a threat, we did a business impact analysis, and a disaster recovery plan for these components, based on which we have built a viable and strong contingency plan to prevail over any form of disruptions that might come our way. Our contingency plan for each of the components at risk is detailed below: 1. Hardware: CloudClass has all its hardware equipment insured. a. A preventive control is to store the server in a clean and cold room, as shown in figure 1. One of the main job responsibilities of the staff is to maintain these two factors. Coolers are installed in a server room to where the temperatures kept within 20-21 degree Celsius, at all times. Figure 4: Temperature Controlled Room b. To avoid short-term power outage, we use generators to support our system and have uninterrupted power supply to lessen system failures. c. We have a standing order understanding with our video, lighting and sound equipment suppliers, in case of calamity. And just in case required, we keep at least two back-up of the entire recording system sets, at one of the founder’s house.
  • 16. Page 15 2. Data storage devices: We already have our server class computer in place, with SSD for vast data storage. a. For our data back-up, we use http://www.opendrive.com cloud store. Opendrive is not only one of the best cloud service available to business but also the most secure and affordable cloud service present in the market (Dunn, 2014). Using cloud storage provides our business not only with high remote and secure storage capacity but also with additional features, such as deduplication which is a specialized data compression technique that eliminates duplicate copies of redundant data, hence enables high data efficiency (EMC Glossary). Cloud storage also helps enable remote access to data. And also to ensure an additional level of data security and privacy, we use virtual private network (VPN) for our collaborations and data backup processes (Diallo, 2014). b. In case of natural calamities or vandalism or system failure we have the business continuity plan in place. For the back-up of storage in case the entire office gets destroyed all the content will be stored in large portable hard-disks which will be kept in different locations. Disk mirroring will be done to make it feasible for the company to sustain up-to-date copies of data in geographically dispersed locations, so that data access can continue uninterrupted if one location is disabled. 3. Network Components: We have implemented the most logical and fail-safe solution to our everyday networking system: a. Cloud Hosting (Thoke). This means that we divide the resources required to run our website over a cluster of web servers, CloudClass uses two web servers namely, https://dhakawebhost.com/, and http://alpha.net.bd/. This allows us to easily manage peak loads without losing any bandwidth. Thus making us impervious to server crash and server overload disruptions. b. Content delivery network (CDN) which will increase efficiency as it distributes the static content of the website such as pictures and videos and puts them in location closer to the people we are serving to. We would be using the Amazon CDN. Amazon servers will cash our content to its servers and thus taking the load off our server and providing faster usage for our website.
  • 17. Page 16 4. Intellectual Property and Software Security: a. Data theft is a major concern for CloudClass. Thus we have registered all our intellectual property under the Main IP Laws: enacted by the Legislature, Copyright Act, 2000 (Act No. 28 of 2000, as amended up to 2005). b. Also by implementing Kaspersky Total Security for Business, one of the world’s best internet and antivirus security system (Rubenking, 2014), on our 25 computers our company is virtually the safest it can be against all viruses and hackers. And in-case if additional computers were introduced, we have Avast ProAntiVirus System as back-up. 5. Online Collaboration: CloudClass is a small business, consisting of 25 employees, of which two are office boys. Our work is purely IT based and staff collaboration is of utmost importance. Our 23 employees do not live in the same city, much less come to the office regularly. Thus online collaboration is an integral part of running our business. We use Social networks, such as Google hangouts, Facebook, Skype, Viber and Facetime, for staff interactions and meetings (From example, see Appendix A). Our cloud service remote distance access comes to work here as it enables us to share and work on business data, e.g. Course contents, user information etc., in a secured platform. 6. Staffing: Having a set plan for staff hiring and training is essential for any business, be it for a short-term inconvenience or a long term requirement. Thus it is explained in detail under “VIII. Contingency Plan Testing & Staff Training” (page- 17)
  • 18. Page 17 VII. IT Contingency Plan Budgeting When it comes to setting up a contingency plan, it is essential to make a budget plan. This helps to figure out from where to source the financing for a contingency plan. Even an estimated budget is better than none. Our IT contingency plan budget consists of estimated numbers, which are subjective to economical and market price changes. With that being said, the table below depicts our contingency plan budget requirements. Table 2: IT Contingency Plan Budget Sl. No. Component Budgeted Requirement 1. Hardware Tk. 80,000 2. Cloud Server Tk. 20,000 per TB for a year 3. Network Server Tk. 10,000 per year 4. Antivirus and Internet Security Tk. 60,000 per year 5. Staffing and Training Process Tk. 25,000 per year Our business is a website, which we cannot run without cloud and network server and security already in place. Thus half the sums quoted here would be required for components 2, 3 and 4. CloudClass is a profitable business with good financial record; thus we have a standing understanding with our bank partner for instant credit loan in case of catastrophe.
  • 19. Page 18 VIII. Contingency Plan Staff Training & Plan Testing A common theme throughout this is the importance of the people who execute a contingency plan. Staffing contingency plans involve researching each project team members' experience and how that affects the project. By knowing who has specific educational and work experience, you can make better decisions about the contingency plans and suitable staff replacements. If there's enough time, potential replacements can be trained so that they have the same or similar knowledge as the person who is no longer on the project. All staff should be thoroughly trained in their roles, duties and responsibilities; more intense training will need to be given to those who will be in key positions. Training for personnel with contingency plan responsibilities should complement testing. Therefore training will be provided at least annually; new hires with plan responsibilities should receive training shortly after they are hired. Ultimately, all personnel involved will be trained to the extent that they are able to execute their respective recovery procedures without aid of the actual guide. Therefore, personnel would be trained on the following plan elements:  Cross-team coordination and communication  Reporting procedures  Security requirements  Team-specific processes  Individual responsibilities Contingency Plan Testing Process: The IT contingency plan must work when needed; finding out that it does not work during an emergency is much too late. Plan testing, training, and exercises will help to establish the viability of the organizations IT contingency plan. Plan testing will discover holes in the plan that must be fixed, or identify procedures that seem simple on paper, but are complex in execution. There are several methods for testing and/or exercising contingency plans to identify potential weaknesses. Contingency plan testing and/or exercises include a determination of the effects on
  • 20. Page 19 organizational operations and assets (e.g., reduction in mission capability) and individuals arising due to contingency operations in accordance with the plan. Since there are many aspects of an IT environment to be tested, there are different kinds of tests to be initiated. There are four basic tests to do that: 1. Walk – Through: Basic disaster recovery testing begins with a desktop walk-through activity, in which team members review plans step by step to see if they make sense and to fully understand their roles and responsibilities. Walkthroughs, workshops and orientation seminars are basic training for team members. They are designed to familiarize team members with emergency response, business continuity and crisis communications plans and their roles and responsibilities as defined in the plans. 2. Simulated Recovery: The next kind of test, a simulated recovery, impacts specific systems and infrastructure elements. Specifically, tests such as failover and failback of critical servers are among the most frequently conducted. These tests not only verify the recoverability of primary and backup servers but also the network infrastructure that supports the failover/failback and the specialized applications that effect failover and failback. 3. Operational exercises: These extend the simulated recovery test to a wider scale, typically testing end-to-end recovery of multiple systems, both internal and external, the associated network infrastructures that support connectivity of those assets, and the facilities that house primary and backup systems. These tests are highly complex, and provide a higher level of risk compared to other tests, as multiple systems will be affected. Loss of one or more critical systems from this kind of test could result in a serious disruption to the organization. 4. Table – Top Exercises: Tabletop exercises are discussion-based sessions where team members meet in an informal, classroom setting to discuss their roles during an emergency and their responses to a particular emergency situation. A facilitator guides participants through a discussion of one or more scenarios. The duration of a tabletop exercise depends on the audience, the topic being exercised and the exercise objectives. Many tabletop exercises can be conducted in a few hours, so they are cost-effective tools to validate plans and capabilities.
  • 21. Page 20 IX. Contingency Plan Review Process A Contingency plan review process is defined as an action that recognizes, investigates and enhances existing techniques inside an association in order to meet the goals and objectives of an organization. In the review process we will check the standard of our contingency planning. The contingency plan should be practical and flexible. We will make the plan modest and easy therefore all the staff and communal members will be able to participate and exploit the benefit for our company. We will ensure the effective and efficient use of our resources. The review process consists of two factors: 1. Standard Operating Procedures (SOPs): We developed a Standard Operating Procedure (SOP) in order to assist the individual with information required to carry out their particular task. It also assists our company to maintain in the quality control process within the organization. It also provides comprehensive description of the work instruction which will decrease miscommunication (Goolaup, 2011). 2. Core Contingency Planning Team (CT): In order to maintain proper monitoring of our IT contingency plan we developed a Core Contingency Planning Team (CT). The CT consists of three to five individuals who are responsible for the entire process. This obligation is reflected in sets of responsibilities also internal working strategies, so that sufficient time is allotted to empower the CT to work frequently on possibility arranging, readiness and limit building (Choularton, 2007). Our contingency plan review process feasibility test has to follow these four steps (as shown in figure): Step-1: Determining our contingency plan and objectives Step-2: Evaluating options, vendors and planning design Step-3: Reviewing plan investment options and providing fee benchmarking Step-4: Completing due diligence review and document results In order to maintain proper monitoring of our IT contingency plan, our CT will monitor and control the review process steps. We will monitor and test the plan on a regular basis using table- top exercises.
  • 22. Page 21 Figure 5: Review Process Table-top exercise is a simple table-top exercise is a facilitated analysis of an emergency situation in an informal, stress-free environment. It is intended to evoke valuable examination as members look at and resolve issues taking into account existing operational plans and distinguish where those arrangements need to be refined. There is insignificant attempt at recreation in a tabletop exercise. Since, supplies are not utilized, assets are not conveyed, and time weights are not presented it will help us to test the capability of our company to respond to a virtual event (Select Your Exercise) The contingency planning process does not end with the creation of an arrangement. It is especially vital that the arrangement be altogether assessed when there is a change in the circumstance or a change in the institutional environment, for example, a noteworthy change in participation or administration of the group/division. Therefore, the process should be persistent and we must review and modernize the plan on a regular basis.
  • 23. Page 22 X. Conclusion An automobile is made up of many pieces. Every piece plays a function to keep it running; one little disjointed piece can bring about a total shutdown of the vehicle. A business is like a well oiled automobile, every component counts. Thus to ensure long, effective and successful business it is a smart decision to have contingency plans in place. In this report we have talked about the IT contingency plans of CloudClass in simple concise details. We believe that with the steps we have taken, as described throughout the report, will ensure a long, effective and successful business. We believe that the above mentioned IT contingency plan, steps and procedures as described in the report, will enable our organization to have faster response for any disruptions, to minimize risk exposure, to ensure proper business functioning and to ensure the continuity of our business, even at the face of any disaster.
  • 24. Page 23 Works Cited 1. Choularton, R. (2007, March). Retrieved March 04, 2015, from Humanitarian Practice Network Website: http://www.odihpn.org/index.php?option=com_k2&view=item&layout=item&id=2868 2. Diallo, A. (2014, August 06). Three Ways To Protect Yourself From Hackers. Retrieved from Forbes: http://www.forbes.com/sites/amadoudiallo/2014/08/06/three-ways-to-protect-yourself- from-hackers/ 3. Dunn, K. (2014). 2015 Best Business Cloud Storage Services. Retrieved March 01, 2015, from Top Ten Reviews: http://business-cloud-storage-services.toptenreviews.com/ 4. EGOL. (2006, Oct. 20). A Contingency Plan for your Web-Based Business. Retrieved March 01, 2015, from The Moz Blog: http://moz.com/blog/a-contingency-plan-for-your-webbased- business 5. EMC Glossary. (n.d.). Retrieved March 03, 2015, from EMC Website: http://www.emc.com/corporate/glossary/data-deduplication.htm 6. Goolaup, P. (2011). Preparing For Severe Weather Emergencies . Retrieved March 04, 2015, from Mauritius Mateorological Services: http://www.liv.ac.uk/media/livacuk/schoolofmanagement/docs/ethnographypapers2014/Liberati _Scaratti.pdf 7. IT Disaster Recovery. (2010, March 12). Retrieved 03 01, 2015, from Respond to Disaster website: http://www.respondtodisaster.org/it-disaster-recovery.htm 8. Jamaluddin, A. (2009). 10 Most Destructive Computer Viruses. Retrieved Feb. 28, 2015, from Hongkiat.com: http://www.hongkiat.com/blog/famous-malicious-computer-viruses/ 9. Rubenking, N. J. (2014, November 26). The Best Antivirus for 2015. Retrieved March 02, 2015, from PC Magaznie: http://www.pcmag.com/article2/0,2817,2372364,00.asp 10. Select Your Exercise. (n.d.). Retrieved March 04, 2015, from Emergency Response Tabletop Exercises: http://www.epa.gov/watersecurity/tools/trainingcd/Pages/exercise-menu.html 11. Thoke, O. (n.d.). Understanding What Cloud Hosting Really Is! Retrieved March 02, 2015, from About Tech Website: http://webhosting.about.com/od/Clouding-Hosting/a/What-Is-Cloud- Hosting-And-Should-You-Consider-It.htm 12. Wiastia. (2006). Retrieved February 20, 2015, from Wistia.com: http://wistia.com/blog
  • 25. Page 24 List of Tables Table 1: Risk Analysis Matrix ..................................................................................................11 Table 2: IT Contingency Plan Budget .........................................................................................17 List of Figures Figure 1: Glass Board Notes ..........................................................................................................8 Figure 2: Code-Red Virus Message.............................................................................................13 Figure 3: Virus Zeus Message .....................................................................................................13 Figure 4: Temperature Controlled Room.....................................................................................14 Figure 5: Review Process.............................................................................................................21
  • 26. Page 25 Appendix A Our group consists of four members. Due to political unrest, we did not have much of face-to- face meet-ups. We mostly worked and interacted through online communication. Along with talking over the phone, we used Skype for video conferences, we created a Facebook group for regular idea and article discussion and finally we used Google drive to store all the data articles we collected to help each other and to shared our term paper write up files and videos. Screen Shots of our FB group and Google Drive Folder is shared below: