Business Continuity And Disaster Recovery Essay

PAGES
7
WORDS
2036
Cite

Moreover, ABBA should settle on using universal guidelines and principles with respect to network security, it risk assessment, risk analysis, and risk management. In this respect, regulatory compliance is a vital aspect influencing the creation of business continuity approach (Frank, 2006). Furthermore, while Business Continuity or Disaster Recovery regulations may be insignificant in some business incidents, companies should be aware of legislation regulating data integrity, availability and compliance. This helps the company in setting up a Business Continuity strategy. The following is a universal disaster preparedness principle for a company facing network security issues with respect to it risk assessment, analysis and management (Frank, 2006).

The ABBA agency should ensure its security and flexibility against probable disasters by implementing the following policies;

1) Telecommunications Asset Management: ABBA should maintain suitable safeguarding of telecommunications assets.

2) Physical Security: ABBA should prevent illegal physical access, harm and intrusion to business premises.

3) Communications and Operations Management: ABBA should ascertain the acceptable and safe operation of telecommunication facilities.

4) Information Security: ABBA shall guarantee safeguarding of data in networks, and the secure operation of data processing facilities.

5) the company should identify the existing Telecommunication Asset ("asset"), and preserve a record of all vital assets.

Furthermore, while reviewing the overall company policies and procedures that are significant for maintaining security, ABBA agency must evaluate the rights and permissions granted to the users by the legal systems for digital media in the...

...

Court. It is essential for ABBA to regularly audit user security rights and permissions to ensure that existing security rights falls in user rights policies and users are unable to violate the rights and policies provided. One of the policies maintained by the company is data loss prevention and regulatory compliance. This policy safeguards organizational security, and concerned with internal risks and threats, for instance, malware, network attacks, and hacker intrusions internal data security and external data loss (Frank, 2006).
Data Loss Prevention is a security policy that prevents the loss of data and safeguards its discretion and privacy. The security measure encompasses the company's data as well as the customer's data stored and disseminated by the company. It is the role of the company to protect data from theft, loss and interference during either storage or transit.

ABBA must have Data Loss Prevention mitigation techniques that employ internal security that utilizes standard network security techniques. Some of the techniques consist of firewalls and antimalware appliances to avoid internal threats, and security for external traffic by employing content filtering and encryption technology. In addition, there are numerous government-driven regulations and policies concerning the protection of data for companies in various industries (Frank, 2006).

Sources Used in Documents:

References

Alexander, D. (2002). Principles of Emergency Planning and Management Harpenden: Terra

Davis, I. (2007). 'Learning from Disaster Recovery- Guidance to Decision Makers' Geneva: International Recovery Programme (IRP)

Frank C. (2006) "Disaster recovery and continuity planning for digital library systems," OCLC Systems & Services, Vol. 22 Issue: 3, pp.173-178


Cite this Document:

"Business Continuity And Disaster Recovery" (2013, June 02) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/business-continuity-and-disaster-recovery-91384

"Business Continuity And Disaster Recovery" 02 June 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/business-continuity-and-disaster-recovery-91384>

"Business Continuity And Disaster Recovery", 02 June 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/business-continuity-and-disaster-recovery-91384

Related Documents

As a result the revenue generated from the business is mainly in the form of commission for them. In case of the web sites operated by United Airlines themselves, the services are owned by them and therefore, the revenue is direct. (Abdollahi & Leimstoll, 2011) Another model used is the advertising business model. According to this model, the UAL provides advertisement to the companies. These companies then broadcast the advertisements

Disaster recovery refers to the IT components of the business that, in times of a disaster, need to be safeguarded so that business can be continued. Disaster recovery is more a preventive plan set in motion prior to the organization and implementation of the business than a series of actions that are followed once the disaster hits the company. Given that most companies are, to a large extent and in

Cloud Computing for Business Continuity and Disaster Recovery for IBM What are the technical, economic, and managerial implications for business continuity and disaster recovery plans in relation to cloud computing and SaaS? The emergence of cloud computing brought about a transformation in economics of organizations' continuity and disaster recovery strategies. In view of this emergence, it's imperative that several companies review their organizational strategies and ascertain that they are fulfilling

Risk Management: Disaster Recovery In essence, disaster recovery has got to do with protecting an organization against events of a negative nature and their effects/impact. Such events include, but they are not limited to, failure of equipment, serious cyber attacks, and natural disasters such as hurricanes and earthquakes. All these put the operations of the organization at risk. This text concerns itself with practical risk management. In so doing, it will,

This approach to creating cyclically-based strategies has helped to alleviate the time constraints on companies over time when it comes to managing the process of education and gaining senior management commitment. The smaller incremental gains made in these smaller organizations have actually proven to be more effective at deterring potential threats as knowledge is accumulated over time and change is gradual (Botha, Von Solms, 2004). The studies that are

For example, the company could consider placing the data recovery system in the desert between West Texas and Nevada. In general, these areas are not subject to tornados or hurricanes. You could then choose, to place the location for all backup servers in a facility that will protect it against the weather such as: placing it underground. Once the facility is complete, you want to ensure that there is