Disaster recovery refers to the IT components of the business that, in times of a disaster, need to be safeguarded so that business can be continued. Disaster recovery is more a preventive plan set in motion prior to the organization and implementation of the business than a series of actions that are followed once the disaster hits the company. Given that most companies are, to a large extent and in many ways, reliant on their IT system, and that collapse of IT system has ramifications beyond the company, disaster recovery has become a significant part of planning to today's organization.
Disasters can be classified into two areas:
Natural disasters -- for example floods, hurricanes, or earthquakes where mitigation measures ahead of time can work towards avoiding or reducing data loss and IT cessation.
Man-made disasters -- such as terrorism where surveillance and avoidance planning can also work towards mitigating and reducing possible determinable results.
Most large companies spend between 2% or 4% of their budget on disaster recovery planning, with the hope that they will avoid large losses were their business to collapse and cease to function, even for a short period of time, due to IT loss of operation and immobility to access data.
The basic principles of planning for recovering from a disaster
Disaster recovery planning (DRP) is a sublet of business continuity plan (BCP) and the two are integrated together when forming a plan for recovering from disaster. Essentially, three measures are involved. These are:
1. Preventative measures -- which are strategies that are planned and worked through to prevent an event form occurring
2. Detective measures -- where controls are put in motion for detecting potential disasters ahead of time
3. Corrective measures -- where controls are planned ahead of time in order to correct and restore the system (business continuity) planning after the disaster has occurred.
The entire plan is outfitted with recovery point objectives (RPO) (i.e. goals for recovery) and recovery time objective (i.e. optimal time limit in which recovery should occur) (RTO). All of this must be matched with the IT systems and infrastructure itself. Each IT infrastructure is then outfitted with specific plans that are most suitable for its recovery and for its system. Both RPO and RTO metrics need to be aligned t a suitable budget, and to be carefully planned in accordance with that budget particularly since some solutions are more expensive than others. Some businesses, again, may have to revert to more expensive solutions depending on their reliance on their IT system.
The most common strategies for data protection include the following:
High availability systems where data and system is replaced in an off-site area where there is continuous access to data and systems
Replication of data to an off-site system
Backups made to both a disk on- and off-site, or backups made directly to an off-site disk.
Backups made to a tape and sent at regular intervals to off site locations.
Precautionary measures that organizations implement include the following:
Anti-virus software and other security systems
Fire prevention
Backup generator and/or uninterruptible power supply to keep the system going in the case of a power failure
Surge protectors
Local mirrors of systems and use of disk protection technology
Why disaster recovery is important
With some companies possessing customers worldwide and operating in extremely competitive atmospheres, it is crucial for these organizations to respond instantly and speedily. The organizations not only have to ensure that their customers are satisfied but they have to delver timely and quality treatment. Data of these customers and issues related to them would have to be easily and rapidly accessed and, with some businesses, IT downtime may spell a spiral of ramifications where other clients are, in turn affected. Accordingly, downtime, if occurring, would not just have to be explained to one client but to exponential other individuals. For these reasons, the organization has to do it its utmost to prevent disaster, or, in the case, of disaster, deal with it as speedily and as efficiently as possible.
Another factor that demands instant and continuous processing is the nature of the work itself. Some companies have clients who rely on the organization for their computer-related problems or for data that is computer based and information has to see to these clients on a regular standard. If the IT base is unavailable, the organization may experience a significant loss of one or more - or even a chain of -valuable customers.
A break in this work may set off a toppling effect, where other companies, experiencing loss too, set off a spiral of destructive events that may cause significant loss and negative...
As Nielsen and Lidstone (1998) note, It is ironic that the public demands safety yet a number of cost-effective and feasible measures to mitigate disasters are not adopted by many... Such a failure of the public to adopt disaster mitigation measures has a long record in Australia (Nielsen and Lidstone 1998) This attitude is one of the reasons given for the greater emphasis on public education. In theoretical terms, the view is
Strategic Plan for Google The following is an outline of the strategic plan for Google that provides insights into the organizational activities, competitiveness, and performance. Executive summary of the business plan of Google Google The mission statement of Google Corporate Culture of Google Historical Development, Performance, and Results of Google Management and the Leadership Structure of Google Situational Analysis of Google (SWOT) Analysis Strengths of Google Weaknesses of Google Opportunities of the Company Threats Facing the Performance and Competitiveness of Google Market Research
A virtualized environment also meets the requirement of offsite backup storage and geographical compliance requirements. Virtualization is also important to an organization with a mobile workforce because it enhances data concentration hence posing less risk of data loss compared to having the data dispersed on removable media, portable computers or embedded devices while out in the field. If the organizations security staff carefully constructs applications that restrict access and services
Emergency Management Disasters are political occurrences; they can either destroy or glorify politicians. The spectacular temperament of disasters calls for the involvement of these chief executives and they test their leadership merits. How politicians control these rare occurrences can frame how their whole term in office receive judgments. During his last White House Press Conference, President George W. Bush was asked about the mistake he made during his reign, and among
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now