Disaster Recovery Plan

The following is a disaster plan.

Section 1. Primary goals of this plan

The primary goals of this plan are the following:

  • To minimize interruptions to normal operations.
  • Limit the extent of disruption and damage.
  • To reduce the economic impact of the interruption.
  • Establish alternative means of the process in advance.
  • To train personnel with emergency procedures.
  • Provide for smooth and rapid restoration of service.

Section 2. Personnel

Data processing personnel

Name Position ID Team Number

   

 Chennakeshwar Reddy Project Manager 002824571 1

 Fayaz Qureishi Researcher 002824572 2

 Tanveer Alam Operations Officer 002824573 3

 Shah Munge IT consultant 002824574 4

 Karim Popat IT consultant 002824575 5

 Abdul Kareem Graduate Clerk 002824576 6

 Jaynat Akrim Clause Administrator 002824577 7

 Najma Patel Contract Reviewer 002824578 8

Section 3. Application profile

 

Application Name Critical (H/M/L) Fixed Asset? Yes/No Manufacturer Comments

 Static testing H Yes IBM To be done once a week

 Dynamic testing M No Phillips To be carried out frequently

 Interactive testing M Yes Panasonic To be done periodically

 Mobile testing M No Dell To be carried out frequently

 

Section 4. Inventory profile

Server Inventory

Device Name Critical (H/M/L)  

Model

Manufacturer Comments

 CPU H Seagate Dell Maintenance is to be done periodically

 Memory subsystem H Western Digital Mitsumi Maintenance to be done periodically

 Fans M Maxis Hotpoint Maintenance to be done periodically

 I/O devices H Seagate IBM Maintenance to be done periodically

 Storage subsystem H Seagate IBM Maintenance to be done periodically

 BIOS M Asus IBM Maintenance to be done periodically

 PCI Device M 1284 IBM Maintenance to be done periodically

 

Miscellaneous inventory (anything not in the above that is part of this system)

Description Quantity Comments

 n/a  

 null  

 n/a  

 null  

 n/a  

 

   

Section 5. Information services backup procedures

Server Name Backup Procedure Audit Frequency

 Application server full backup Daily

 Client-server incremental backup Daily

 FTP server incremental backup Monthly

 Mail server total backup Weekly

 Virtual server full backup Weekly

Section 6. Disaster recovery procedures

The following three elements are addressed in any disaster recovery plan

Emergency Response Procedures

To document the appropriate emergency response to a fire, natural disaster, or any other activity to protect lives and limit the damage.

Backup Operations Procedures

To ensure that essential data processing operational tasks are conducted after the disturbance.

Recovery Actions Procedures

To facilitate the rapid restoration of a data processing system following a disaster.

Disaster action checklist

The organization should have a strategy for responding to emergencies. This checklist will offer information crucial for the continuity of core business functions and identify the resources required for ensuring personnel safety. Additionally, timely emergency support is provided to protect assets and essential records for electronic and hard copy forms.

  1. Plan Initiation
    1. Notify senior management
    2. Contact and set up a disaster recovery team.
    3. Determine the degree of disaster.
    4. Implement a proper application recovery plan dependent on the extent of the disaster (see Section 7. Recovery plan–mobile site)
    5. Monitor progress
    6. Contact the backup site and establish schedules.
    7. Get in touch with all other necessary personnel–both user and data processing.
    8. Contact vendors–both hardware and software
    9. Notify users of the disruption of service.
  2. Follow-Up Checklist
    1. List the teams and tasks of each.
    2. Obtain emergency cash and set up transportation to and from the backup site, if necessary.
    3. Set up living quarters, if necessary.
    4. Set up eating establishments, as required.
    5. List all personnel and their telephone numbers.
    6. Establish a user participation plan.
    7. Set up the delivery and the receipt of mail.
    8. Establish emergency office supplies.
    9. Rent or purchase equipment as needed
    10. Determine applications to be run and in what sequence.
    11. Identify the number of workstations needed.
    12. Check out any off-line equipment needs for each application.
    13. Take a look at the forms needed for each application.
    14. Check all data taken to the backup site before leaving and leave the inventory profile at the home location.
    15. Set up primary vendors for assistance with problems incurred during emergencies.
    16. Plan for transportation of any additional items needed at the backup site
    17. Take directions (map) to the backup site.
    18. Check for additional magnetic tapes, if required.
    19. Take copies of system and operational documentation and procedural manuals.
    20. Ensure that all personnel involved know their tasks.
    21. Notify insurance companies

Section 7. Recovery plan-mobile site

Mobile site setup plan

The mobile site will be a friendly site with an independent, portable environment. The electric cables layout in such a manner that is safe for everyone. The servers and the other components will be placed in such a way that there is personal head and hand protection.

The components will be placed on an elevated surface so that one can walk through the details while inspecting them to ensure that all compliance measures are being met. The site will be fenced with electric fences to protect the zombies that may want to interfere with the setup.

There will be the first fence that will be just the wire net and barbed wire. The second one will have electric cables. When a zombie goes past one of them, it won’t be easy to go past the second one.

Communication disaster plan

The disaster plan will include a spokesperson, proactive damage control, case escalation, social media response, and customer feedback collection and analysis. The communication will involve accidents likely to injure employees or others, property damage to company facilities, production or service interruptions, and product quality issues.

Messages are communicated to customers, employees, government regulators, supply management, neighbors in the community, and news media.

The communication disaster plan will look like the below.

Overview

It consists of the outline of crisis communications and what it entails.

Purpose

The resolution of crisis communications, like the types of events that would provoke crisis communication responses and what role the plan plays in crisis communications, will be built-in.

Objectives

The goals for the crisis communication plan include efficient responses to emergencies, thorough informing of stakeholders, and restoration of everyday business functions.

Procedures

The people involved in the crisis communications team and general guidelines, such as whether or not a member needs the support of the entire team to activate the plan, will be stated.

Response

The general response strategies will be stated, such as technologies used for crisis communications, key audiences to be notified, and appointed spokespersons.

Electrical service

  • The electrical services will consist of a desktop computer with IT distribution circuit breakers and the residual current release.
  • An external bypass switch to a UPS is entirely in operation to take power.
  • The circuits to the server racks
  •  Surge protector
  •  Complete bonding system for server cabinets
  • A planned reserve of sufficient space in the distribution

Primary protection

The power system protection scheme will be designed to protect the power system parts and components from zombie attacks. When a fault happens on any line, it will be cleared by its relay and circuit breaker.

The service record of primary relaying is very high, with well over 90% of all operations being correct. Since faults are sometimes not illuminated by the direct or central protection system, the secondary or backup protection system will handle the required job.

The electrical room will be under lock and key to guard against a zombie attack.

Secondary Protection

Backup protection is essential for a stable and reliable power system. Zombies could infiltrate the primary caretaker and be successful.

Due to such an expectation, secondary protection will be needed and will help disconnect the faulty part from the system. Therefore, greater emphasis will be placed on the better maintenance of primary relaying, which is economical and ensures that all zombies are kept at bay.

Section 8. Protecting Primary Site

 Basics are covered to protect assets from physical threats like zombies and digital threats. A security policy will be written down to guide how activities are carried out.

The policy will also have an incident response plan. Secondly, physical security will be looked upon. A secured wires and wireless network will be laid down. There will be restrictions through locks, key cards, and video surveillance. No way a zombie will be given a chance to infiltrate.

The approach taken will be holistic. There will be several layers of defense, physical, procedural, and digital, to address different threats.

There will be a demilitarized zone between the networks. On the network perimeter, firewalls and intrusion are used to keep threats at bay. Out-of-band deep packet inspection (DPI) will help prevent viruses, spam, and other intrusions.

 

Section 9. Testing the disaster recovery plan

The disaster recovery plan will comprise five tests. The first test will be the paper test, where individuals will be required to read and understand recovery plans just in case of a zombie attack.

The second test will be the walk-through test, where issues and changes will be identified and gone through. The next test will be the simulation test which will be used to test whether emergency response plans are adequate. A parallel test will confirm if the set systems can perform actual business transactions to support crucial processes.

The last test will be the cut-over test. The cut-over refers to the system where other components can handle the work of a particular method when the other fails. This way, the continuity of the business will be ensured in-case zombies decide to bring down one of the components.

Here is a sample project in the project management task. Please consider.

 

Calculate a fair price for your paper

Such a cheap price for your free time and healthy sleep

1650 words
-
-
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality.
Total price: $78
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?