The following is a disaster plan.
The major goals of this plan are the following:
Data processing personnel | |||
Name | Position | ID | Team Number |
Chennakeshwar Reddy | Project Manager | 002824571 | 1 |
Fayaz Qureishi | Researcher | 002824572 | 2 |
Tanveer Alam | Operations Officer | 002824573 | 3 |
Shah Munge | IT consultant | 002824574 | 4 |
Karim Popat | IT consultant | 002824575 | 5 |
Abdul Kareem | Graduate Clerk | 002824576 | 6 |
Jaynat Akrim | Clause Administrator | 002824577 | 7 |
Najma Patel | Contract Reviewer | 002824578 | 8 |
Application Name | Critical (H/M/L) | Fixed Asset? Yes/No | Manufacturer | Comments |
Static testing | H | Yes | IBM | To be done once a week |
Dynamic testing | M | No | Phillips | To be carried out frequently |
Interactive testing | M | Yes | Panasonic | To be done periodically |
Mobile testing | M | No | Dell | To be carried out frequently |
Device Name | Critical (H/M/L) |
Model |
Manufacturer | Comments | ||
CPU | H | Seagate | Dell | Maintenance to be done periodically | ||
Memory subsystem | H | Western Digital | Mitsumi | Maintenance to be done periodically | ||
Fans | M | Maxis | Hotpoint | Maintenance to be done periodically | ||
I/O devices | H | Seagate | IBM | Maintenance to be done periodically | ||
Storage subsystem | H | Seagate | IBM | Maintenance to be done periodically | ||
BIOS | M | Asus | IBM | Maintenance to be done periodically | ||
PCI Device | M | 1284 | IBM | Maintenance to be done periodically | ||
Miscellaneous inventory (anything not in the above that is part of this system) |
||||||
Description | Quantity | Comments | ||||
n/a | ||||||
null | ||||||
n/a | ||||||
null | ||||||
n/a | ||||||
Server Name | Backup Procedure | Audit Frequency |
Application server | full backup | Daily |
Client server | incremental backup | Daily |
FTP server | incremental backup | Monthly |
Mail server | full backup | Weekly |
Virtual server | full backup | Weekly |
For any disaster recovery plan, the following three elements should be addressed.
Emergency Response Procedures
To document the appropriate emergency response to a fire, natural disaster, or any other activity in order to protect lives and limit damage.
Backup Operations Procedures
To ensure that essential data processing operational tasks can be conducted after the disruption.
Recovery Actions Procedures
To facilitate the rapid restoration of a data processing system following a disaster.
Disaster action checklist
The organization should have a strategy for responding to emergencies. This checklist will offer information crucial for the continuity of core business functions and identify the resources required for ensuring personnel safety. Timely emergency support will be offered to protect assets and crucial records both in electronic and hard copy form.
The mobile site will be a warm site with an independent environment which is portable. The electric cables will be laid out in such a manner that they are safe for everyone. The servers and the other components will be placed in such a way that there is personal head and hand protection.
The components will be placed in an elevated surface and in such a way that one will be able to walk through the components while inspecting them to ensure that all compliance measures are being met. The site will be fenced with electric fences to protect the zombies that may want to interfere with the set up.
There will be the first fence that will be just the wire net and barbed wire. The second one will have the electric wires. When a zombie goes past one of them, it will be difficult to go past the second one.
The disaster plan will be divided into the spokesperson response, proactive damage control, case escalation, social media response and customer feedback collection and analysis. The communication will involve accidents likely to injure employees or others, property damage to company facilities, production or service interruptions and product quality issues.
The messages will be communicated to customers, employees, government regulator, supplies management, neighbors in the community and news media.
This consists of the outline of crisis communications and what it entails.
The resolve of crisis communications, like the types of events would provoke crisis communication responses and what role the plan plays in crisis communications will be built-in.
The goals for the crisis communication plan, such as efficient responses to emergencies, thorough informing of stakeholders, and restoration of normal business functions will be stated
The people involved in the crisis communications team and general guidelines, such as whether or not a member needs the support of the entire team in order to activate the plan will be stated
The general response strategies, such as technologies used for crisis communications, key audiences to be notified, and appointed spokespersons will be stated
Primary protection
The power system protection scheme will be designed to protect the power system parts and components from zombie attacks. When a fault happens on any line, it will be cleared by its relay and circuit breaker.
The service record of primary relaying is very high with well over 90% of all operations being correct. Since sometimes faults are not illuminated by the primary or main protection system, secondary or backup protection system will then handle the required job.
The electrical room will be under lock and key to guard them from any form of a zombie attack.
Secondary Protection
Back-up protection is very important for stable and reliable power system. Zombies could infiltrate the primary protection and possibly be successful.
Due to such an expectation, the secondary protection will be needed and will help disconnect the faulty part from the system. Therefore, greater emphasis will be placed on the better maintenance of primary relaying which is economical and ensuring that all zombies are kept at bay.
To protect the assets from physical threats like zombies and digital threats, all the basics will be covered. There will be a security policy written down that will give a way forward on how activities will be carried out.
The policy will also have an incident response plan. Secondly, the physical security will be looked into. A secured wires and wireless network will be laid down. There will be restrictions through locks, key cards and video surveillance. No way will a zombie be given a chance to infiltrate.
A holistic approach will be taken. There will be several layers of defense, that is, physical, procedural and digital to address different types of threats.
There will be a demilitarized zone between the networks. On the network perimeter, firewalls and intrusion will be used to keep threats at bay. Out of band deep packet inspection (DPI) will help keep off viruses, spams and other intrusions.
The disaster recovery plan will comprise of five tests. The first test will be the paper test where individuals will be required to read and understand recovery plans just in case a zombie attacks.
Second test will be the walk through test where issues and changes will be identified and gone through. The next test will be the simulation test which will be used to test whether emergency response plans are adequate. Parallel test will be used to confirm if the set systems can perform actual business transactions to support crucial processes.
The last test will be the cut-over test. The cut-over refers to the system where other components can handle the work of a particular system when the other fails. This way, the continuity of the business will be ensured in-case zombies decide to bring down one of the components.
This is a sample project in project management task.Please consider.
All online transactions are done using all major Credit Cards or Electronic Check through PayPal. These are safe, secure, and efficient online payment methods.