The following is a disaster plan.
The primary goals of this plan are the following:
Data processing personnel
Name Position ID Team Number
Chennakeshwar Reddy Project Manager 002824571 1
Fayaz Qureishi Researcher 002824572 2
Tanveer Alam Operations Officer 002824573 3
Shah Munge IT consultant 002824574 4
Karim Popat IT consultant 002824575 5
Abdul Kareem Graduate Clerk 002824576 6
Jaynat Akrim Clause Administrator 002824577 7
Najma Patel Contract Reviewer 002824578 8
Application Name Critical (H/M/L) Fixed Asset? Yes/No Manufacturer Comments
Static testing H Yes IBM To be done once a week
Dynamic testing M No Phillips To be carried out frequently
Interactive testing M Yes Panasonic To be done periodically
Mobile testing M No Dell To be carried out frequently
Device Name Critical (H/M/L)
Model
Manufacturer Comments
CPU H Seagate Dell Maintenance is to be done periodically
Memory subsystem H Western Digital Mitsumi Maintenance to be done periodically
Fans M Maxis Hotpoint Maintenance to be done periodically
I/O devices H Seagate IBM Maintenance to be done periodically
Storage subsystem H Seagate IBM Maintenance to be done periodically
BIOS M Asus IBM Maintenance to be done periodically
PCI Device M 1284 IBM Maintenance to be done periodically
Miscellaneous inventory (anything not in the above that is part of this system)
Description Quantity Comments
n/a
null
n/a
null
n/a
Server Name Backup Procedure Audit Frequency
Application server full backup Daily
Client-server incremental backup Daily
FTP server incremental backup Monthly
Mail server total backup Weekly
Virtual server full backup Weekly
The following three elements are addressed in any disaster recovery plan
Emergency Response Procedures
To document the appropriate emergency response to a fire, natural disaster, or any other activity to protect lives and limit the damage.
Backup Operations Procedures
To ensure that essential data processing operational tasks are conducted after the disturbance.
Recovery Actions Procedures
To facilitate the rapid restoration of a data processing system following a disaster.
Disaster action checklist
The organization should have a strategy for responding to emergencies. This checklist will offer information crucial for the continuity of core business functions and identify the resources required for ensuring personnel safety. Additionally, timely emergency support is provided to protect assets and essential records for electronic and hard copy forms.
The mobile site will be a friendly site with an independent, portable environment. The electric cables layout in such a manner that is safe for everyone. The servers and the other components will be placed in such a way that there is personal head and hand protection.
The components will be placed on an elevated surface so that one can walk through the details while inspecting them to ensure that all compliance measures are being met. The site will be fenced with electric fences to protect the zombies that may want to interfere with the setup.
There will be the first fence that will be just the wire net and barbed wire. The second one will have electric cables. When a zombie goes past one of them, it won’t be easy to go past the second one.
The disaster plan will include a spokesperson, proactive damage control, case escalation, social media response, and customer feedback collection and analysis. The communication will involve accidents likely to injure employees or others, property damage to company facilities, production or service interruptions, and product quality issues.
Messages are communicated to customers, employees, government regulators, supply management, neighbors in the community, and news media.
It consists of the outline of crisis communications and what it entails.
The resolution of crisis communications, like the types of events that would provoke crisis communication responses and what role the plan plays in crisis communications, will be built-in.
The goals for the crisis communication plan include efficient responses to emergencies, thorough informing of stakeholders, and restoration of everyday business functions.
The people involved in the crisis communications team and general guidelines, such as whether or not a member needs the support of the entire team to activate the plan, will be stated.
The general response strategies will be stated, such as technologies used for crisis communications, key audiences to be notified, and appointed spokespersons.
Primary protection
The power system protection scheme will be designed to protect the power system parts and components from zombie attacks. When a fault happens on any line, it will be cleared by its relay and circuit breaker.
The service record of primary relaying is very high, with well over 90% of all operations being correct. Since faults are sometimes not illuminated by the direct or central protection system, the secondary or backup protection system will handle the required job.
The electrical room will be under lock and key to guard against a zombie attack.
Secondary Protection
Backup protection is essential for a stable and reliable power system. Zombies could infiltrate the primary caretaker and be successful.
Due to such an expectation, secondary protection will be needed and will help disconnect the faulty part from the system. Therefore, greater emphasis will be placed on the better maintenance of primary relaying, which is economical and ensures that all zombies are kept at bay.
Basics are covered to protect assets from physical threats like zombies and digital threats. A security policy will be written down to guide how activities are carried out.
The policy will also have an incident response plan. Secondly, physical security will be looked upon. A secured wires and wireless network will be laid down. There will be restrictions through locks, key cards, and video surveillance. No way a zombie will be given a chance to infiltrate.
The approach taken will be holistic. There will be several layers of defense, physical, procedural, and digital, to address different threats.
There will be a demilitarized zone between the networks. On the network perimeter, firewalls and intrusion are used to keep threats at bay. Out-of-band deep packet inspection (DPI) will help prevent viruses, spam, and other intrusions.
The disaster recovery plan will comprise five tests. The first test will be the paper test, where individuals will be required to read and understand recovery plans just in case of a zombie attack.
The second test will be the walk-through test, where issues and changes will be identified and gone through. The next test will be the simulation test which will be used to test whether emergency response plans are adequate. A parallel test will confirm if the set systems can perform actual business transactions to support crucial processes.
The last test will be the cut-over test. The cut-over refers to the system where other components can handle the work of a particular method when the other fails. This way, the continuity of the business will be ensured in-case zombies decide to bring down one of the components.
Here is a sample project in the project management task. Please consider.
All online transactions are done using all major Credit Cards or Electronic Check through PayPal. These are safe, secure, and efficient online payment methods.