Alan Nagy
IT-240
Edward Spear
Disaster Plan
10/26/2014
Associate Level Material
Appendix G
Company A
The IST Department of XYZ Computers is located on the first floor. Payroll and all human resources records are processed daily and bi-weekly for 10,000 employees. After payroll is run, data is backed up using tapes. No firewall is in place, and e-mail is on the same server as payroll.
XYZ Computers is located in the southern part of the United States in an area that receives heavy rain. During the weekend, a major water pipe broke and flooded the first floor. The water caused extensive damage to the servers, which were also on the first floor.
After reviewing the information from XYZ Computers, we assessed its most critical deficiencies and we come to an evaluation of each of the disaster that might affect the productivity and safety of the information and employees of the company.
1. Since the company is built in an area that is affected by flooding, and this happens in a relatively risk area, the IST Department has to move their hardware and software to a second floor as well as all the servers, which have to be as far away as possible to the flooding risk areas of the premises. The most valuable information of the company is kept in this servers and they have to be taken away from any risk area, for a better performance and safekeeping.
2. Payroll and Human resources since they are processed daily and biweekly, they have to back up their systems in the same frequency, we have a high number of employees and all the information has to be kept safe and updated constantly. Tapes process can be improved if applied to a RAID array, and cannot be easily stolen putting at risk very important information about the company and its workers.
3. Email has to be created within an intranet system, creating an intern website for the internal communication, and placing firewalls for information coming from external sources. It cannot run in the same server as the payroll, because even with the firewalls in place is a very delicate area that can be hacked and introduce malware to the system, placing a great amount of information defenseless to any threat.
4. All the software and hardware that was damaged by the past flood have to be check for failure or internal damage, and if it is the possibility of recovering is possible we suggest to mirror the information to a new server, before disposing the equipment, which has to be properly formatted and destroyed. All information from the company should be back up on site, but also there should be a second copy in a low risk area for natural events or vandalism.
5. Due to the volume of employees and transactions we suggest a RAID 6 array because we need a large drive capacity, this will also minimize the probability that in the case of a failure of a drive, with its double parity, it will have more tolerance for failure. We carry a big number of processes every day, and keeping the information of more than 10000 employees, and also our customers have to be a priority and needs to take action immediately.
6. We have to establish security measures and disaster evacuation plans, creating safe areas, meeting points and backup power systems, to ensure that in case of any eventuality all the employees are well informed on how to respond to an emergency, avoiding chaos and accidents. having an specialized safety team inspect the building and the area to look for high risk areas, to evaluate the plans of action and lower the risk for any personal and technical damage.
7. Drills have to be proposed and take in place at least twice a year, and in extraordinary weather event seasons, were it might be imminent an eventuality.
8. Working with the community and government, the area has to be studied for flooding risk areas, but also to use this resources for the benefit of nearby areas, creating small levees and digging channels to guide flooding waters away
Disaster Plan Anthony James Wolf IT/240 May 17, 2015 Raymond Schafer Disaster Plan This week’s assignment requires to analyze two different businesses, XYZ computers and 123 textiles corporations, and create a disaster plan for one of the above companies and recommend a backup plan for the selected company’s data. After examining both companies, I choose to create a disaster and data backup plan for company A, XYZ computers. One reason I choose company a is because I live in the southern part…
D Disaster Recovery Plan University of Phoenix IT/244 Intro to IT Security Disaster Recovery Plan 1 Risk Assessment 1 Critical business processes A disaster is defined as a sudden, unplanned catastrophic event that renders the organizations ability to perform mission-critical and critical processes, including the ability to do normal production processing of systems that support critical business processes. A disaster could be the result…
Management Plan for Security and Privacy 1 Management Plan for Security and Privacy 2 Abstract Many times, disaster recovery planning fails to consider how diverse regulations and compliance issues will impact an organization after a natural disaster strikes (Talon, 2006). For instance, organizations regulated by the Health Insurance Portability and Accountability Act of 1996 (HIPAA), will discover that disaster recovery planning can be a complex web of potential pitfalls…
The disaster recovery plan for SunGrafix includes step-by-step procedures of the disaster recovery process. Since this is a gamin company, the DR plan is quite different than a normal business. We have covered or at least touched all the eight steps of disaster recovery plan. It includes facilities’ diagrams, network diagrams, risk assessments, threat mitigation process, plan test results and action plan etc. The Need For a Disaster Recovery Plan SunGrafix’s business sales have been increasing…
be able to recover data? Plan Format For the CPA firm that wants to offer disaster recovery planning services to clients, the challenge is being able to utilize a comprehensive and customized disaster recovery plan format that is understandable and affordable to the small and mid-sized company. In establishing our disaster recovery plan format we asked the question, "What help would a client need after receiving word that his/her business has just experienced a disaster emergency?" To identify a…
Yvette Coleman SCI/256 November 19, 2014 Professor Stevens A disaster is several aftermaths that overpowers the existing resident properties vital to survive through the developing health, ecological, and infrastructural values. A disaster could be severe or enduring, logically happening or social provoked. The common disasters are Natural which include; Geological (Tremor, Volcano, Avalanche), Metrological (Rainfall/Flood, Sleet, Hurricane). Human Induced which include; Non Intentional…
Research Paper 1 How safe are the government facilities? Rebecca Leon Empire State University Business Continuity Planning and Disaster Recovery Diane Delucia April 01, 2015 Research Paper 2 On March 9th 2015 an email was sent out to every Army recruiting…
10 Lab Chapter 14 is about developing a Disaster Recovery Plan to help mitigate risk. A DRP is a plan on how your business will react and recover from a disaster by restoring a critical business process or system to operation. A DRP or several DRPs could be included in a Business Continuity Plan. A DRP will most likely include a purpose. This can include anything from saving lives to ensuring the continuity of your business by recovering from a disaster. The success of your DRP is dependent…
Project Part 2 Task 2 Victor Sabani ITT Technical Institute Table of Contents 1. Purpose and Objective a. Scope b. Plan Update c. Plan Documentation Storage d. Plan triggering events 2. Dependencies 3. Disaster Recovery Strategies a. Disaster Recover Team 4. Disaster Recovery Procedures 5. Response Phase 6. Resumption Phase a. Data Center Recovery b. Internal or External Dependency Recovery c. Significant Network or Other Issue Recovery (Defined by quality of service guidelines) 7. Restoration…
Assessment Weighting 30% Assessment Type Written Due Date Week 6 Room 101 George St Details of Subject Qualification ICA50111 Diploma of Information Technology Subject Name Disaster Recovery and Contingency Plans Details of Unit(s) of competency Unit Code ICASAS505A Review and update disaster recovery and contingency plans Details of Student Student Name College Student ID Student Declaration: I declare that the work submitted is my own, and has not been copied or plagiarised from any person…