Verified Document

Information System Recovery In The Thesis

The next step in developing the organization's information system recover plan is to take stock of existing hardware. As Cohen emphasizes, "If you have been hosting your company's Web site on an office computer, it is time to stop. For the cost of a cup of coffee per day, a Web-hosting center can fully protect your site off-site, where it will not tie up your company's bandwidth" (p. 3). This approach to maintaining important contacts with customers and an organization's intranet has several strengths over an organization's hosting the Web site in-house. For instance, Reagan (2006) notes that, "A hosted solution provides an organization with the flexibility of deploying an IP-enabled system without the maintenance costs involved in a self-maintained model. Network upgrades, enhancements and, most importantly, the scaling of bandwidth and phone lines are all handled by the provider" (p. 61). Here again, the primary strength involved in this step relates to the ability of an organization to continue operations in the event of the unexpected with a relatively modest cost being the corresponding weakness.

After the organization has identified its mission-critical important systems, the next step concerns determining how best to replace them in the event of loss. In this regard, Cohen (2004) emphasizes that, "If a critical system fails how long could you do without it before it would negatively affect your business? Think carefully, because the answers will have a major impact on how you will protect your systems and how much you will spend to gain that protection. If your business absolutely, positively, cannot afford to be off-line for more than a few hours, you might think about moving your systems to a hosted data center" (p. 4). Hosted data centers and so-called "third-party hot-sites" are becoming increasingly commonplace and the cost is low compared to the potential savings that can be realized in the event of a disaster. As Reagan (2006) points out, "The third-party hot-site is currently the most attractive option for many organizations that wish to implement a disaster recovery plan. These sites offer attractive pricing on the storage and real-time back-up of an organization's critical information systems, and typically offer cubicles or work stations on a per-seat basis" (p. 61).

While...

In this regard, Reagan advises, "During recent events, these third-party organizations performed well in protecting and providing access to their customers' critical information systems; however, problems did arise in supporting the enterprise telecommunications network" (p. 61). To overcome these constraints, Reagan recommends designing and deploying a voice-over Internet protocol (VOIP) plan in addition to third-party hot-sites. For example, Reagan points out that, "Organizations may want to consider a 'self-maintained' telecommunications recovery solution, which involves co-locating VOIP recovery equipment alongside data recovery equipment at a third-party service provider's site" (p. 61).
Conclusion

The research showed that organizations of all types and sizes should expect the unexpected when it comes to their mission-critical information systems. Manmade and natural disasters can disrupt a company's information system operations in major ways, and unless steps are taken in advance of such occurrences, the impact on the organization's bottom line could also be disastrous. Fortunately, there are some fairly straightforward steps that organizations can take today that can help them overcome the impact of such unexpected disruptions in their information systems, including inventorying their data files and hardware, maintaining additional backed-up copies off site and contracting with third-party providers for Web site hosting and "hot-site" access. In the final analysis, it is clear that the time to think about information system recovery plans is before a disaster strikes, rather than during or after its occurrence.

References

Cohen, B. (2004, November 17). Data recovery planning -- What you need to know.

SmallBusinessComputing.com. [Online]. Available: http://www.smallbusiness computing.com/webmaster/article.php/3436831.

Reagan, C. (2006, February). Using VOIP to recover telecommunications services: A new generation of disaster recovery processes and telecom systems can help your enterprise deal with a crisis. Business…

Sources used in this document:
References

Cohen, B. (2004, November 17). Data recovery planning -- What you need to know.

SmallBusinessComputing.com. [Online]. Available: http://www.smallbusiness computing.com/webmaster/article.php/3436831.

Reagan, C. (2006, February). Using VOIP to recover telecommunications services: A new generation of disaster recovery processes and telecom systems can help your enterprise deal with a crisis. Business Communications Review, 36(2), 60-61.
Cite this Document:
Copy Bibliography Citation

Related Documents

Information System MIS Stands for "Management Information
Words: 1293 Length: 4 Document Type: Essay

Information System MIS stands for "Management Information System." It is one of the computer-based tools to manage organizational operations efficiently. It consists of software that managers' use in making decision, for data storage, in project management applications, for records and procedures for making customers relations etc. Nowadays most of the organizations have separate MIS department which is basically responsible for computer systems. MIS is also called "Information System" or "Information Technology."

Geographic Information System GIS and Client Server System and...
Words: 3197 Length: 12 Document Type: Case Study

Client server systems are a group of inter-related subsystems which collaborate together to provide a specific solution or service. This computing model structures diverse and distributed applications, which separates tasks between the providers (servers) and service seekers (clients). Keeping the purpose of this paper in view, the provider-server is the Geographical Informative System and the client is the U.S. government. This paper analyzes Geographical Informative System (GIS) as its client

Information Technology -- Managing Information
Words: 564 Length: 2 Document Type: Essay

Vandalism Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Information Systems and Technology Issues in Developing Countries
Words: 9969 Length: 30 Document Type: Term Paper

Information Systems (IS) and Technology Issues in Developing Countries Technology has changed society in a manner much like the Industrial Revolution of the 17th century. The technology revolution started in the U.S. And the countries of Western Europe, in a manner similar to the industrial revolutions. The benefits of this revolution were immediately obvious in the improvement of productivity and the quality of life in the countries. Realizing the benefits that

System Implementation the Implementation Stage of the
Words: 1423 Length: 4 Document Type: Essay

System Implementation The implementation stage of the Riordan project may prove to be the most challenging yet, but one that is worth all the effort. It would take a team of experts in various fields to successfully see this stage successfully through to completion, it cannot be a one-man show. Several departments within the organization have to be given priority when it comes to rolling out the new human resource management

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now