Disaster Recovery Plan

Section 1. Major goals of this plan

The major goals of this plan are the following:

  • To minimize interruptions to the normal operations.
  • To limit the extent of disruption and damage.
  • To minimize the economic impact of the interruption.
  • To establish alternative means of operation in advance.
  • To train personnel with emergency procedures.
  • To provide for smooth and rapid restoration of service.

Section 2. Personnel

Data processing personnel

Name Position Student ID Team Number
       
 Chennakeshwar Reddy  Project Manager  002824571  1
 Fayaz Qureishi  Researcher  002824572  2
 Tanveer Alam  Operations Officer  002824573  3
 Shah Munge  IT consultant  002824574  4
 Karim Popat  IT consultant  002824575  5
 Abdul Kareem  Graduate Clerk  002824576  6
 Jaynat Akrim  Clause Administrator  002824577  7
 Najma Patel  Contract Reviewer  002824578  8

Section 3. Application profile

 
Application Name Critical (H/M/L) Fixed Asset? Yes/No Manufacturer Comments
 Static testing  H  Yes  IBM  To be done once a week
 Dynamic testing  M  No  Phillips  To be carried out frequently
 Interactive testing  M  Yes  Panasonic  To be done periodically
 Mobile testing  M  No  Dell To be carried out frequently

Section 4. Inventory profile

Server Inventory

Device Name Critical (H/M/L)  
Model
Manufacturer Comments
 CPU  H  Seagate  Dell  Maintenance to be done periodically
 Memory subsystem  H  Western Digital  Mitsumi  Maintenance to be done periodically
 Fans  M  Maxis  Hotpoint  Maintenance to be done periodically
 I/O devices  H  Seagate  IBM  Maintenance to be done periodically
 Storage subsystem  H  Seagate  IBM  Maintenance to be done periodically
 BIOS  M  Asus  IBM  Maintenance to be done periodically
 PCI Device  M  1284  IBM  Maintenance to be done periodically

 

Miscellaneous inventory (anything not in the above that is part of this system)

Description Quantity Comments
 n/a    
 n/a    
 n/a    
 n/a    
 n/a    

Section 5. Information services backup procedures

Server Name Backup Procedure Audit Frequency
 Application server  full backup  Daily
 Client server  incremental backup  Daily
 FTP server  incremental backup  Monthly
 Mail server  full backup  Weekly
 Virtual server  full backup  Weekly

Section 6. Disaster recovery procedures

For any disaster recovery plan, the following three elements should be addressed.
Emergency Response Procedures
To document the appropriate emergency response to a fire, natural disaster, or any other activity in order to protect lives and limit damage.
Backup Operations Procedures
To ensure that essential data processing operational tasks can be conducted after the disruption.
Recovery Actions Procedures
To facilitate the rapid restoration of a data processing system following a disaster.

Disaster action checklist

The organization should have a strategy for responding to emergencies. This checklist will offer information crucial for the continuity of core business functions and identify the resources required for ensuring personnel safety. Timely emergency support will be offered to protect assets and crucial records both in electronic and hardcopy form.

  1. Plan Initiation
    1. Notify senior management
    2. Contact and set up disaster recovery team
    3. Determine degree of disaster
    4. Implement proper application recovery plan dependent on extent of disaster (see Section 7. Recovery plan–mobile site)
    5. Monitor progress
    6. Contact backup site and establish schedules
    7. Contact all other necessary personnel–both user and data processing
    8. Contact vendors–both hardware and software
    9. Notify users of the disruption of service
  2. Follow-Up Checklist
    1. List teams and tasks of each
    2. Obtain emergency cash and set up transportation to and from backup site, if necessary
    3. Set up living quarters, if necessary
    4. Set up eating establishments, as required
    5. List all personnel and their telephone numbers
    6. Establish user participation plan
    7. Set up the delivery and the receipt of mail
    8. Establish emergency office supplies
    9. Rent or purchase equipment, as needed
    10. Determine applications to be run and in what sequence
    11. Identify number of workstations needed
    12. Check out any off-line equipment needs for each application
    13. Check on forms needed for each application
    14. Check all data being taken to backup site before leaving and leave inventory profile at home location
    15. Set up primary vendors for assistance with problems incurred during emergency
    16. Plan for transportation of any additional items needed at backup site
    17. Take directions (map) to backup site
    18. Check for additional magnetic tapes, if required
    19. Take copies of system and operational documentation and procedural manuals.
    20. Ensure that all personnel involved know their tasks
    21. Notify insurance companies

Section 7. Recovery plan-mobile site

Mobile site setup plan

The mobile site will be a warm site with an independent environment which is portable.  The electric cables will be laid out in such a manner that they are safe for everyone. The servers and the other components will be placed in such a way that there is personal head and hand protection. The components will be placed in an elevated surface and in such a way that one will be able to walk through the components while inspecting them to ensure that all compliance measures are being met. The site will be fenced with electric fences to protect the zombies that may want to interfere with the set up. There will be the first fence that will be just the wire net and barbed wire. The second one will have the electric wires. When a zombie goes past one of them, it will be difficult to go past the second one.

Communication disaster plan

The disaster plan will be divided into the spokesperson response, proactive damage control, case escalation, social media response and customer feedback collection and analysis. The communication will involve accidents likely to injure employees or others, property damage to company facilities, production or service interruptions and product quality issues. The messages will be communicated to customers, employees, government regulator, supplies management, neighbors in the community and news media.
 
The communication disaster plan will look like below

  1. Overview

This consists of the outline of crisis communications and what it entails.

  1. Purpose

The resolve of crisis communications, like the types of events would provoke crisis communication responses and what role the plan plays in crisis communications will be built-in.

  1. Objectives

The goals for the crisis communication plan, such as efficient responses to emergencies, thorough informing of stakeholders, and restoration of normal business functions will be stated

  1. Procedures

The people involved in the crisis communications team and general guidelines, such as whether or not a member needs the support of the entire team in order to activate the plan will be stated

  1. Response

The general response strategies, such as technologies used for crisis communications, key audiences to be notified, and appointed spokespersons will be stated

Electrical service

·         The electrical services will consist of a desktop computer that will have IT distribution circuit breakers with residual current release
·         An external bypass switch to a UPS fully in operation by to take power
·         The circuits to the server racks
·         A surge protector
·         A complete bonding system for server cabinets
·         A planned reserve sufficient space in the distribution

 
Primary protection
The power system protection scheme will be designed to protect the power system parts and components from zombie attacks. When a fault happens on any line, it will be cleared by its relay and circuit breaker. The service record of primary relaying is very high with well over 90% of all operations being correct. Since sometimes faults are not illuminated by the primary or main protection system, secondary or backup protection system will then handle the required job. The electrical room will be under lock and key to guard them from any form of a zombie attack.
Secondary Protection
Back-up protection is very important for stable and reliable power system. Zombies could infiltrate the primary protection and possibly be successful. Due to such an expectation, the secondary protection will be needed and will help disconnect the faulty part from the system. Therefore, greater emphasis will be placed on the better maintenance of primary relaying which is economical and ensuring that all zombies are kept at bay.

Section 8. Protecting Primary Site

To protect the assets from physical threats like zombies and digital threats, all the basics will be covered. There will be a security policy written down that will give a way forward on how activities will be carried out. The policy will also have an incident response plan. Secondly, the physical security will be looked into.  A secured wires and wireless network will be laid down. There will be restrictions through locks, key cards and video surveillance. No way will a zombie be given a chance to infiltrate.
A holistic approach will be taken. There will be several layers of defence, that is, physical, procedural and digital to address different types of threats. There will be a demilitarized zone between the networks. On the network perimeter, firewalls and intrusion will be used to keep threats at bay. Out of band deep packet inspection (DPI) will help keep off viruses, spams and other intrusions

Section 9. Testing the disaster recovery plan

The disaster recovery plan will comprise of five tests. The first test will be the paper test where individuals will be required to read and understand recovery plans just in case a zombie attacks. Second test will be the walkthrough test where issues and changes will be identified and gone through. The next test will be the simulation test which will be used to test whether emergency response plans are adequate. Parallel test will be used to confirm if the set systems can perform actual business transactions to support crucial processes. The last test will be the cutover test. The cutover refers to the system where other components can handle the work of a particular system when the other fails. This way, the continuity of the business will be ensured incase zombies decide to bring down one of the components.
 
 
 
 
Order Now

Calculate a fair price for your paper

Such a cheap price for your free time and healthy sleep

1650 words
-
-
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality.
Total price: $78
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?