This document provides a disaster recovery plan report for the Department of Infrastructure (DOI) IT organization. It outlines the roles and responsibilities of the disaster recovery team, potential risks to the organization, and policies and procedures for establishing and testing the disaster recovery plan. The plan is intended to minimize disruption to DOI operations in the event of a disaster by enabling the recovery of critical systems, applications, and data. It addresses technical aspects like database and server backups as well as broader business continuity issues. The overall goal is to allow for the systematic resumption of computing and telecommunications services to priority business functions as quickly as possible following a disaster.
Disaster recovery plans (DRP) are required by all organizations. During a disaster, the DRP will provide all of the information that the organization needs to get back to business-as-usual in as little time as possible. There are three steps involved in successfully documenting a DRP:
•Use tests and audits to help fuel the plan creation.
•Ensure the plan contains all information required in an emergency.
•Put mechanisms in place to maintain and update the plan as needed.
Be prepared! Use this solution set to create a comprehensive DRP for your organization.
Disaster recovery plans (DRP) are required by all organizations. During a disaster, the DRP will provide all of the information that the organization needs to get back to business-as-usual in as little time as possible. There are three steps involved in successfully documenting a DRP:
•Use tests and audits to help fuel the plan creation.
•Ensure the plan contains all information required in an emergency.
•Put mechanisms in place to maintain and update the plan as needed.
Be prepared! Use this solution set to create a comprehensive DRP for your organization.
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
Disaster recovery will be the procedure, policies and procedures that are associated with getting yourself ready for recovery or continuation of technologies infrastructure that are vital for an organization following a natural or human-induced catastrophe. Disaster recovery is really a subset connected with business continuity. While business continuity entails planning for maintaining all facets of a company functioning in the midst of bothersome occasions, disaster recovery targets the IT or technology techniques that support company features.
How to switch from reactive maintenance to preventive maintenance complete ...BryanLimble
To show you that the switch from reactive to preventive maintenance doesn’t have to be hard, complicated, and expensive, we devised this comprehensive step-by-step guide that will guide you through the whole process.
Configuration Compliance For Storage, Network & Server EMC
This white paper shows the benefits of integrating IT infrastructure management technologies such as Network Configuration Manager, Storage Configuration Advisor and vCenter Configuration Manager into the RSA Archer platform for Configuration Compliance.
Provided as is, without warranty, for businesses to consider as a very early starting point in the preparation of a business continuity plan. This work is based upon material delivered to University business students.
Beyond Predictive and Preventive MaintenanceHarshad Shah
Did you know you could save up to 18% with a Predictive Maintenance Management Strategy?
Predictive and Preventive Maintenance is a well-known term and most know what it entails but have you looked past the strategy checklist? Here is for a more in-depth look beyond Predictive and Preventive Maintenance.
Modern organizations from different sizes (Small, , Medium and Large) consider information as one of the most important of their assets that need to be secured against increasing number of threats. The importance of the information comes from its impacts on the main tasks performed by the organization. The evolution of Information Technology and Information Systems is changing permanently the characteristics and the components of such systems and the ways needed to protect them against any security risk. Periodic data backup is a system administration task that has changed as new technologies have altered the fundamental structure of networks. These changes encourage rethinking of modern backup strategies and techniques. In addition, standard backup programs and specialized tools are often needed. This paper provides an overview of issues to be considered for a long term, stable and secure backup system. A new approach (Hardware) called Black Box backup system is proposed based on current risk management plans and procedures used mainly in the aerospace industry.
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
Have you ever wondered if your organization's Disaster Recovery initiatives are in line with business objectives? How can you get business units, IT, and senior management on the same page when it comes to the company's resiliency?
Introducing the Disaster Recovery Maturity Framework, a new, vendor-agnostic tool for analyzing your organization's resiliency level.
Learn how to assess your company's DR maturityand discover:
- What resiliency really means
- The five different maturity levels for disaster recovery
- Key elements to assess your company's own maturity score
- How to use the DR Maturity Framework as a catalyst for change
Disaster Recovery: Develop Efficient Critique for an Emergencysco813f8ko
Disaster recovery will be the procedure, policies and procedures that are associated with getting yourself ready for recovery or continuation of technologies infrastructure that are vital for an organization following a natural or human-induced catastrophe. Disaster recovery is really a subset connected with business continuity. While business continuity entails planning for maintaining all facets of a company functioning in the midst of bothersome occasions, disaster recovery targets the IT or technology techniques that support company features.
How to switch from reactive maintenance to preventive maintenance complete ...BryanLimble
To show you that the switch from reactive to preventive maintenance doesn’t have to be hard, complicated, and expensive, we devised this comprehensive step-by-step guide that will guide you through the whole process.
Configuration Compliance For Storage, Network & Server EMC
This white paper shows the benefits of integrating IT infrastructure management technologies such as Network Configuration Manager, Storage Configuration Advisor and vCenter Configuration Manager into the RSA Archer platform for Configuration Compliance.
Provided as is, without warranty, for businesses to consider as a very early starting point in the preparation of a business continuity plan. This work is based upon material delivered to University business students.
Beyond Predictive and Preventive MaintenanceHarshad Shah
Did you know you could save up to 18% with a Predictive Maintenance Management Strategy?
Predictive and Preventive Maintenance is a well-known term and most know what it entails but have you looked past the strategy checklist? Here is for a more in-depth look beyond Predictive and Preventive Maintenance.
Modern organizations from different sizes (Small, , Medium and Large) consider information as one of the most important of their assets that need to be secured against increasing number of threats. The importance of the information comes from its impacts on the main tasks performed by the organization. The evolution of Information Technology and Information Systems is changing permanently the characteristics and the components of such systems and the ways needed to protect them against any security risk. Periodic data backup is a system administration task that has changed as new technologies have altered the fundamental structure of networks. These changes encourage rethinking of modern backup strategies and techniques. In addition, standard backup programs and specialized tools are often needed. This paper provides an overview of issues to be considered for a long term, stable and secure backup system. A new approach (Hardware) called Black Box backup system is proposed based on current risk management plans and procedures used mainly in the aerospace industry.
The Surprising Truth About Your Disaster Recovery Maturity LevelAxcient
Have you ever wondered if your organization's Disaster Recovery initiatives are in line with business objectives? How can you get business units, IT, and senior management on the same page when it comes to the company's resiliency?
Introducing the Disaster Recovery Maturity Framework, a new, vendor-agnostic tool for analyzing your organization's resiliency level.
Learn how to assess your company's DR maturityand discover:
- What resiliency really means
- The five different maturity levels for disaster recovery
- Key elements to assess your company's own maturity score
- How to use the DR Maturity Framework as a catalyst for change
Disaster recovery in the Cloud - whitepaper Karolina Dryja
Business Continuity Planning (BCP) and Disaster Recovery (DR) have changed significantly over recent years due to the disruptive impact of the cloud computing market. The emergence of new cloud-based technologies, the associated progress in virtualisation products and the reduction in connectivity costs have significantly influenced DR and BCP solutions with important benefits across the board, transforming the relevant offerings in the marketplace.
What used to be a stagnant necessity, often associated with doubling the cost of ownership of an Information System, now Disaster Recovery solutions can be extensions of flexible “production” platforms and components of an overall Cloud migration strategy.
Commercial virtualisation technologies and standards have revolutionised the way Disaster Recovery services are now provided and consumed. Whilst traditionally a recovery/failover platform would mean re-designing and building a physical replica of the primary Information System, modern Disaster Recovery services can be consumed on-demand and at a fraction of the cost.
Interested in starting a company in South East Asia? Here's a quick report on the Philippines through the lens of a Silicon Valley serial entrepreneur.
Cyber Security and Business Continuity an Integrated DisciplineGraeme Parker
This was the presentation delivered by Graeme Parker - Managing Director at Parker Solutions Group - at the Crisis Management Days Conference at the University of Applied Sciences Velika Gorica in Croatia. The talk focussed on how the disciplines of Cyber Security and Business Continuity are closely linked and the importance of converging these two disciplines to be fully prepared in age of increasing cyber attacks.
Task 1.Complete the BIA table below and use it for the remaialehosickg3
Task 1.
Complete the BIA table below and use it for the remainder of the assignment.
You may want to review your Lab #07 assignment where you developed a BIA table.
Information needed to create the Business Functions and Processes below are in the “Project Management Plan” scenario and the “Project Health Network Visual”.
Hint: look at the processes that go from the customers and into the systems/applications in the “Project Health Network Visual”.
Business Function or Process
Business Impact Factor
Recovery Time Objective
IT Systems/Apps Infrastructure Impacts
Task 1: Business Impact Analysis – extracts from the Boiler Plate
1.
Overview
This Business Impact Analysis (BIA) is developed as part of the contingency planning process for the HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system
.
It was prepared for Health Network, Inc (Health Network).
2.
System Description
Indicate the
operating environment (i.e. Data Center, etc)
,
physical location
,
general location of users
, and
partnerships with external organizations/systems
.
Include information regarding any other technical considerations that are important for recovery purposes, such as backup procedures or the
lack of backup procedures
.>
3.1.1
Identify Outage Impacts and Estimated Downtime
Estimated Downtime
The table below identifies the MTD, RTO, and RPO for the organizational business processes that rely on the HNetExchange Message system, HNetConnect Directory system and HNetPay Payment system.
Mission/Business Process
For HNetExchange
MTD
RTO
RPO
Mission/Business Process
For HNetConnect
MTD
RTO
RPO
Mission/Business Process
For HNetPay
MTD
RTO
RPO
Task 2: Business Continuity Plan – extracts from the Boiler Plate
These tapes are then stored offsite.
The HNetPay data is backed-up daily and retained for 6 months.
The HNetMessage messages are backed-up daily and retained for 3 months.
All other data is backed-up weekly and retained for 60 days.
If the BCP is executed, the most current tapes are copied and mailed to the alternate site.
Modify the statements below to reflect this decision.>
Emergency management standards
Data backup policy
Full and incremental backups preserve corporate information assets and should be performed on a regular basis for audit logs and files that are irreplaceable, have a high replacement cost, or are considered critical. Backup media should be stored in a secure, geographically separate location from the original and isolated from environmental hazards.
Department-specific data and document retention policies specify what records must be retained and for how long. All organizations are accountable for carrying out the provisions of the instruction for records in their organization.
IT follows these standards for its data backup and archiving:
Tape retention policy
Backup media is stored at locations that are secure, isolated from envir ...
Disaster Recovery: Understanding Trend, Methodology, Solution, and StandardPT Datacomm Diangraha
Disaster Recovery (DR)
Provides the technical ability to maintain critical services in the event of any unplanned incident that threatens these services or the technical infrastructure required to maintain them.
Disaster Prevention And Mitigation PowerPoint Presentation SlidesSlideTeam
Presenting this set of slides with name - Disaster Prevention And Mitigation Powerpoint Presentation Slides. This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with thirty three slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. When you download this presentation by clicking the download button, you can get the presentation in both standard and widescreen format. All slides are fully customizable. Change the colors, font, size, add and remove things as per your needs. The presentation is fully supported with Google Slides. It can be easily converted into JPG or PDF format.
Term paper for CSE371: Management Information System Course
Course Lecturer: Mr. Syed Mahmudur Rahman
This paper talks about our business "Cloud Class" and its IT Contingency plans.
Prevention Protection And Mitigation Planning PowerPoint Presentation SlidesSlideTeam
Presenting this set of slides with name - Prevention Protection And Mitigation Planning Powerpoint Presentation Slides. . This deck comprises of total of thirty two slides. It has PPT templates with creative visuals and well researched content. Not just this, our PowerPoint professionals have crafted this deck with appropriate diagrams, layouts, icons, graphs, charts and more. This content ready presentation deck is fully editable. Just click the DOWNLOAD button below. Change the colour, text and font size. You can also modify the content as per your need. Get access to this well crafted complete deck presentation and leave your audience stunned.
Corporate Disaster Prevention And Preparedness PowerPoint Presentation Slides SlideTeam
Presenting this set of slides with name - Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides. This complete deck is oriented to make sure you do not lag in your presentations. Our creatively crafted slides come with apt research and planning. This exclusive deck with thirty two slides is here to help you to strategize, plan, analyse, or segment the topic with clear understanding and apprehension. Utilize ready to use presentation slides on Corporate Disaster Prevention And Preparedness Powerpoint Presentation Slides with all sorts of editable templates, charts and graphs, overviews, analysis templates. It is usable for marking important decisions and covering critical issues. Display and present all possible kinds of underlying nuances, progress factors for an all inclusive presentation for the teams. This presentation deck can be used by all professionals, managers, individuals, internal external teams involved in any company organization.
Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And ...Citrix Online
“Business Continuity And Disaster Recovery Are Top IT Priorities For 2010 And 2011”
Key Findings:
• Improving business continuity and disaster recovery (BC/DR) capabilities is the No. 1 priority for SMBs and the second highest priority for enterprises for the next 12 months
• IT plans to spend at least 5% more on BC/DR in the next 12 months (only 11% of enterprises and 8% of SMBs plan to decrease spending on BC/DR)
• BC/DR represents between 6% and 7% of the IT budget
Similar to Network Strategy and Design Final assignment disaster rec (20)
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Attending a job Interview for B1 and B2 Englsih learnersErika906060
It is a sample of an interview for a business english class for pre-intermediate and intermediate english students with emphasis on the speking ability.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
3. IT19 (Network Strategy and Design)
Contents
Contents....................................................................................................3
Introduction:..............................................................................................4
Overview.....................................................................................................................................4
Scope:.......................................................................................................6
Guidelines:................................................................................................6
Roles of Team Organization:....................................................................6
Risks:........................................................................................................8
ANALYSIS...............................................................................................9
Establish Role Departments:...................................................................10
Policies and procedures:.........................................................................11
Project Planning......................................................................................11
Preparing to Handle Disaster:.................................................................12
DR Plan/Procedures:...............................................................................13
Testing the disaster recovery plan:.........................................................15
The Recovery Planning Process.............................................................15
Conclusion:-............................................................................................15
Glossary of Terms:....................................................................................................................16
References:..............................................................................................16
Disaster Recovery, viewed on 20dec 2009.............................................16
4. IT19 (Network Strategy and Design)
Introduction:
In 2004, AICL formed a partnership with TAFE NSW - Sydney Institute to sequentially
deliver the Advanced Diploma of Hospitality Management. AICL started delivery in
February 2005 at TAFE Loftus campus, but the partnership became so successful
within 12 months it delivered this course on four campuses:
• - AICL
• - Loftus TAFE
• - Mount Druitt TAFE
• - Padstow TAFE
As hospitality is very important industry where Australia is suffering from a skills
shortage, AICL have actively participated in industry to give concrete support. Students
have been placed in industry working part-time in some very prestigious establishments
to consolidate the skills they are acquiring whilst studying on campus.
AICl has won three consecutive awards since 2006. AICL was awarded the Tourism
Training Australia "National Training Legend Award" for outstanding achievement in
delivery and positive contribution to the hospitality industry.
In 2007 AICL won the Australian TAFE Marketing Association (ATMA) Award for
Business Development - Innovative Commercial Service Category. An award titled The
Minister’s Student Achiever Award (for Tourism and Hospitality) was won by AICL in
2008.
Overview
Planning for the business continuity of an organization in the aftermath of a disaster is a
complex task. Preparation for, response to, and recovery from a disaster affecting the
administrative functions of the organization requires the cooperative efforts of many
support departments in partnership with the functional areas supporting the "business"
of DOI.
5. IT19 (Network Strategy and Design)
This document proposes disaster recovery plans to address various types of possible
disaster scenarios. The plans reflect the analysis and determination of appropriate
responses as agreed in discussions with representatives from Corporate IT and other
departments.
This document is intended to provide a framework, with some possible solutions, of the
backup and disaster recovery plans for the DOI project. As with all disaster / recovery
situations, not all variations can be documented.
Why Disaster Recovery?
Planning for the business continuity of Disaster Action Team (DAT)/DOI in the
aftermath of a disaster is a complex task. Preparation for, response to, and recovery
from a disaster affecting the administrative functions of the organization requires the
cooperative efforts of many divisions in partnership with the functional areas supporting
the "business" of DOI.
The objectives of a disaster recovery plan for information services are to make sufficient
preparations, and to establish a sufficient set of agreed upon procedures, for
responding to a disaster or emergency, in order to minimize the effect upon the
operation of the business.
Need for a Disaster Recovery Plan
Three areas need to be reviewed: legal responsibility, financial loss and business
service interruptions.
Legal Responsibility: Management has a legal responsibility to protect its corporate
resources and information.
Financial Loss: Because of the efficiency, accuracy, speed and control of information
services methods, organizations are more dependent on their information services in
normal business operations. If the information systems services break down, a great
financial loss to the company could develop, or even destroy the business if proper
disaster planning has not been done.
Business Service Interruption: This can be very damaging to future relationships with
customers. It can also affect the public image of the organization. The costs of not
taking precautions could be much more damaging and costly than modest preparation
for disaster recovery.
Purpose:
The purpose of disaster recovery/business resumption planning is to assure continuity
of computing and telecommunications operations needed to support critical agency
functions. The business resumption plan should aim at achieving a systematic and
orderly resumption of all agency computing and telecommunications services. The plan
should provide for restoring service as soon as possible. Those functions that are most
critical to achieving the agency mission must remain in operation during the recovery
period.
6. IT19 (Network Strategy and Design)
Scope:
These guidelines apply to all executive and judicial branch agencies and educational
institutions, as provided by law, that operate, manage, or use IT services or equipment
to support critical state business functions.
Guidelines:
Emergency response/problem escalation procedures prescribe how to respond to two
kinds of situation:
• Disaster events: Fires, floods, earthquakes, and bombings are examples of disaster
events. They often take the form of unforeseen events that cause damage or lengthy
disruption or threaten to do so. One can more readily recognize the situation is a
disaster during this type of occurrence.
• Problem: A disaster may evolve from a problem that disrupts normal operations and
then worsens or continues so long that disruption becomes critical.
Roles of Team Organization:
Planning for the business continuity of DOI in the aftermath of a disaster is a complex
task. Preparation for, response to, and recovery from a disaster affecting the
administrative functions of the organization requires the cooperative efforts of many
divisions in partnership with the functional areas supporting the "business" of DOI.
The following personnel are required to be present during pre and post recovery
process.
Responsibilities of Roles
IT System Administrator(Roshan B)
Responsible for the verification and
operational maintenance of the system at
the Server level
Shutdown of the Workgroup(TRIM) and Master
services
Shutdown of the Fulcrum Indexer, PDF
Generator and Encapsulator services
Reconcile Fulcrum and TRIM database with the
execution of the maintenance tool
7. IT19 (Network Strategy and Design)
Perform store check
Perform shakeout testing
Execute SQL query to determine missing
records at the SQL Server database level with
assistance from the SQL Server DBA
Execute SQL query to remove unwanted record
information at the SQL Server database level
with assistance from the SQL Server DBA
Identifying and recovering missing files from
backup or workgroup server cache with
assistance from the SQL Server DBA
Records Manager / System Administrator
Responsible for the verification and
operational maintenance of the system at
the business level
Notify all users of the DR procedures, advising
them to log off and verify the process
Identifying records to be recreated
Verification and maintenance of the records at
the TRIM level
Identification and removal of information from the
system after the database restoration process
for records supposed to have been expunged or
purged with the assistance of the SQL Server
DBA
SQL Server DBA
Responsible for the operational
maintenance, backup and restoration of the
SQL server database.
Daily full backup of the SQL database
Hourly backup of the SQL log dump
Backup of the corrupted database
Backup of the SQL log files
Restore last SQL backup from tape
Application of SQL logs at SQL Server level
8. IT19 (Network Strategy and Design)
Daily full backup of File System information with
assistance from the IT System Administrator and
NT Administrator
NT Administrator
Responsible for the maintenance of the
system hardware, communications, security
and network operation
Execution of standard hardware maintenance
Maintenance of the Server hardware
environment including communication, network,
etc
Risks:
− There are many natural and Human made threats to service areas which could
cause business interruption. Potential threats to consider include personnel,
physical environment, hardware/software systems, telecommunications,
applications, and operations.
Disaster Recovery Team proposed to develop a schedule back up within a week and
help to maintain the Faculty as well as student database of the organization. The major
challenge faced by the IT department was to be able to restore the original applications
and database without having to go through the whole process of installation which
would take much longer in the event of a failure. Specifically, they needed to identify
and tackle a large number of system issues such as which processes to stop, which and
who’s files to modify and which steps to automate or perform manually at the time of the
recovery.
− Threats affecting contingency planning.
Natural hazards:
∗ Earthquake
∗ Tornado
∗ Flooding
∗ Landslide
∗ Volcanic eruption
∗ Lightning
∗ Smoke, dirt, dust
∗ Sandstorm or blowing dust
∗ Windstorm
∗ Snow/ice storm
Accidents:
9. IT19 (Network Strategy and Design)
∗ Disclosure of confidential information
∗ Electrical disturbance
∗ Electrical interruption
∗ Spill of toxic chemical
Environmental failure:
∗ Water damage
∗ Structural failure
∗ Fire
∗ Hardware failure
∗ Liquid leakage
∗ Operator/user error
∗ Software error
∗ Telecommunications interruption
Intentional acts:
∗ Alteration of data
∗ Alteration of software
∗ Computer virus
∗ Bomb threat
∗ Disclosure of confidential information
∗ Employee sabotage
∗ External sabotage
∗ Terrorist activity
∗ Fraud
∗ Riot/civil disturbance
∗ Strike
∗ Theft
∗ Unauthorized use
∗ Vandalism
ANALYSIS
Technology and telecommunications systems are becoming increasingly important for
businesses to perform their most basic business functions. Disruptive events, such as
natural disasters, intentional or unintentional errors in human judgment and
10. IT19 (Network Strategy and Design)
vulnerabilities in computing hardware or software, can be so disastrous and debilitating
to a business that it renders itself inoperable.
With a rising number of threats and an intense competitive business landscape, it is
becoming increasingly important that your organization have the ability to withstand a
disaster. Certain organizations also have implied legislative requirements to fulfill
various disaster recovery and business continuity obligations often resulting in
additional costs and complexities.
Research shows that of those businesses that spend less than 5% of their IT budget on
disaster recovery strategies, less than 50% are likely to reopen or remain in business
within 2 years of experiencing a major loss of business information and less than 6%
will survive long term.
As such, the need to implement a Disaster Recovery Plan to protect business
information and core technology platforms are becoming an increasing priority for many
businesses that want to operate in the unfortunate event that a disaster occurs
Establish Role Departments:
Disaster Recovery is all about planning and having a sound strategy for data protection.
Our Disaster Recovery plan is relatively simple. Your data is stored within our Data
Centres and we adhere to industry best practices for Disaster Recovery using the latest
and most reliable technology, systems and procedures.
Emergency Response
The strategies selected must provide a sufficient base upon which procedures can be
devised which afford all personnel the immediate capability to effectively respond to
emergency situations where life and property have been, or may be, threatened or
harmed.
Backup Operations
Most backup sites will not have sufficient equipment, personnel, supplies, etc., to
sustain the complete operational requirements or another facility. In this case, a more
detailed backup strategy must be developed.
Server Farm - Load Balanced Infrastructure
Data Centers provide High Availability through the logical allocation of Hardware
resources to different users, minimizing the impact of a hardware failure or disaster.
Multiple servers are grouped together. Applications can be configured to be delivered
from all servers in the farm or any subset easily from the application publishing allowing
for simple load balancing across the available platforms.
11. IT19 (Network Strategy and Design)
Virtualization Infrastructure:
Traditional disaster recovery plans require many manual, complex steps to allocate
recovery resources, perform bare metal recovery, perform data recovery, and validate
that systems are ready for use. Our Infrastructure service eliminates many steps in the
process and simplifies the recovery process.
Virtualization removes the need to have the correct hardware configuration, patches
and firmware in place and eliminates the challenges associated with recovering the
operating system and installing applications on different hardware.
Virtualization converts a traditional Disaster Recovery Process and environment,
including hardware configuration, firmware, operating system install and application
install, into data stored in just a few files on disk. Protecting a complete system is just a
matter of protecting a few files using backup and replication software. The files that
comprise a virtual machine can be recovered to any hardware without requiring any
changes because virtual machines are hardware-independent. Servers can be
reprovisioned in minutes not days in the event of a physical layer failure.
Policies and procedures:
The disaster recovery policy must be reviewed at least annually to assure its
relevance. Just as in the development of such a policy a planning team that consists of
upper management & personal from information security, information technology,
human resources or other operations should be assembled to review the disaster policy.
Roles and responsibilities of the planning team should be as follows:
• Perform an initial risk assessment to determine current information systems
vulnerabilities.
• Perform an initial business impact analysis to document and understand the
interdependencies among business processes and determine how the business
would be affected by and information systems outage.
• Take an inventory of information systems assets such as computer hardware,
software, applications and data.
• Identify single points of failure within the information systems infrastructure.
• Identify critical applications, systems and data.
• Prioritize key business functions.
Project Planning
Get preliminary management commitment.
Gets agreement from senior management on the need for disaster recovery/business
resumption planning.
Designate a disaster recovery/business resumption manager.
Designate a person to manage the agency's recovery from a disaster. The designated
individual must have sufficient knowledge of information management and information
technology (IT) within the agency in order to work effectively with IT hardware and
12. IT19 (Network Strategy and Design)
software, the data centres, and service providers in re-establishing information
processing and telecommunications services after a disaster has occurred.
Organize a disaster recovery/business resumption planning team.
Organize a team that will be responsible for the detailed technical analysis and planning
functions needed for a recovery plan.
Identify individuals from management, data processing, telecommunications, business
operating units, and consultants to participate in preparing the disaster
recovery/business resumption plan.
Audit current recovery preparedness.
Determine what security/disaster recovery/business resumption plans are in place.
Identify what planning remains to be done.
Develop the project schedule.
Estimate task durations, identify responsibilities, assign resources, and document the
schedule for plan development.
Preparing to Handle Disaster:
IT Threats
Breach of Personal Information
• All data owners must report any suspected or confirmed breach of personal
information on individuals to the Chief Security Officer (CSO) immediately upon
discovery.
• Location managers are responsible for ensuring all employees in their unit are aware
of policies and procedures for protecting personal information.
• Informs the Legal Department and the Chief Privacy Officer that a possible privacy
breach has been reported and provides them an overview of the situation.
• Contacts the individual who reported the problem.
• Reviews the preliminary details with the Legal Department and the Chief Privacy
Office.
Denial of Service / Distributed Denial of Service
• Inform relevant IT security personnel.
• Ensure all communication links are up.
• Ensure data integrity.
.
• Provide alternate solutions in case primary communication channels are down.
Virus Outbreak
• Isolate system, devices, servers.
13. IT19 (Network Strategy and Design)
, etc from the network and switch over to backup equipments.
• Report the situation to the Network Security Officer.
Fire/Smoke
• Activate the nearest fire alarm. You may find one at development lobby, server
room, kitchen and corridor.
• Call 16 and report location and source of fire, if known.
• If it is possible and safe, turn off all electrical equipments.
• Evacuate the building.
• After reaching a safe location, contact other responsible departments.
Bomb or other terrorist threat
• Call (92-21) 2416626, Bomb Disposal Squad.
• If the threat has been received via phone call then keep talking to the caller and try
to get as much information as possible.
• Evacuate the building; depending on the instructions provided by the disposal squad.
Power / Connectivity Failure
• Switch off all electrical equipment
• Determine extent of blackout by calling relevant department engineer.
• Make sure that all doors will remain closed before evacuation. Consult the relevant
person if any door found unlocked.
• Initiate the telephone tree to ensure that everyone arrives at home safely.
Heavy Rain
• Relocate the equipment and records to a dry location which may be affected.
• Determine extent of the rain and its severity for the building.
• Inform the management to take immediate actions for releasing the employees
earlier.
• Evacuate the basements in case some rain water poured in.
DR Plan/Procedures:
Key Components
An operational Disaster Recovery facility consists of three key components:
• Facilities and Infrastructure – the underlying IT infrastructure and data must be
structured to be recoverable – this involves physical infrastructure and software
• Processes and Procedures – Business Continuity/Disaster Recovery must be
incorporated into standard processes and procedures
• Operational Business Continuity/Disaster Recovery Plan – there must be an
operational and tested plan to recover
14. IT19 (Network Strategy and Design)
A fundamental requirement of an operational Business Continuity/Disaster Recovery
plan is a High Availability IT infrastructure. This both tolerates some outages and
minimizes the impacts of serious events by providing easy and fast recovery. A well-
designed infrastructure will is a key enabler to achieving effective Business
Continuity/Disaster..Recovery.
Increased data dependency between systems and applications mean than an
increasing volume of data is critical for effective recovery.
15. IT19 (Network Strategy and Design)
Testing the disaster recovery plan:
The Recovery Planning Process
There are nine major phases in the recovery planning process:
1. Project Planning: Define the project scope, organize the project, and identify the
resources needed.
2. Critical Business Requirements: Identify the business functions most important to
protect, and the means to protect them. Analyse risks, threats, and vulnerabilities.
3. Recovery Strategies: Arrange for alternate processing facilities to use during a
disaster. Make sure to store copies of computer files, work-in-process, software, and
documentation in a safe place.
4. Emergency Response/Problem Escalation: Specify exactly how to respond to
emergencies and how to tell when a "problem" has become a potential "disaster."
5. Plan Activation: Determine procedures for informing the right people, assessing the
impact on operations, and starting the recovery efforts.
6. Recovery Operations: Develop the specific steps for reducing the risks of an
outage and restoring operations should an outage occur.
7. Training: Make sure everyone understands the recovery plan and can carry it out
efficiently.
8. Testing: Make sure the plan works effectively.
9. Plan Maintenance: Make changes and additions to keep the plan current.
Conclusion:-
Changes to organizations occur all the time. Products and services change as do their
method of delivery.
The increase in technological based processes over the past ten years & particularly
within the last few years, have significantly increased the level of dependency upon the
availability of systems and information for the business to function effectively. These
changes are likely to continue, and it is likely that the only certainty is that the pace of
change will continue to increase.
It is necessary for the disaster recovery plan to keep pace with these changes in order
for it to be of use in the event of a disruptive emergency.
To ensure this, the disaster recovery plan update process must be properly structured
and controlled. Further, whenever changes are made to the plan they are to be fully
tested and appropriate amendments should be made to the training materials. This will
involve the use of formalized change control procedures under the control of the plan's
owner.
16. IT19 (Network Strategy and Design)
In short, update of the plan should not only be a formal process in its own right, but
must be part of business as usual.
Glossary of Terms:
Term Description
API Applications Programming Interface
DR Data Recovery
Encapsulator Process that converts objects
GUI Graphic User Interface
HTML Hyper Text Markup Language
IE5 Internet Explorer version 5
PDF Portable Document Format
TRIM Tower Records and Information Management Software
URL Uniform Resource Locator eg. Web address
XML extensible Markup Language
References:
Disaster Recovery, viewed on 20dec 2009
http://searchenterprisewan.techtarget.com/sDefinition/0,,sid200_gci752089,00.html
Disaster recovery, Disaster recovery, viewed on 21dec2009,
http://en.wikipedia.org/wiki/Disaster_recovery
Disaster Recovery Plan, viewed on 2dec 2009,
http://www.anbg.gov.au/cpbr/disaster-plan/
Risk Analysis, viewed on 20dec , 2009
http://www.devx.com/security/Article/16390
17. IT19 (Network Strategy and Design)
DISASTER RECOVERY PLANNING FROM A-Z viewed on viewed on 25 Nov 2009
http://www.disaster-recovery-guide.com/