Preview

Disaster Plan

Good Essays
Open Document
Open Document
1162 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Disaster Plan
Cherrelle Ward
IT/ Intro into LAN Technologies
Due:3/15/2015

The IST Department of XYZ Computers is located on the first floor. Payroll and all human resources records are processed daily and bi-weekly for 10,000 employees. After payroll is run, data is backed up using tapes. No firewall is in place, and e-mail is on the same server as payroll.
XYZ Computers is located in the southern part of the United States in an area that receives heavy rain. During the weekend, a major water pipe broke and flooded the first floor. The water caused extensive damage to the servers, which were also on the first floor. Create a disaster plan to prevent this sort of problem from happening in the future.
Proposed solution:
The way in which XYZ Computers has their IST Department set up currently is susceptible to many threats. The lack of a firewall is an open invitation for data to be stolen by prying eyes, and the vulnerability of placing the payroll database is in the same server as the email service. The geographic and weather conditions of the location of the company have a high risk of flooding, yet the Servers were installed on the first floor. Lastly, the backup method in place is sort of outdated and there is no mention on how often the backup takes place; additionally, the backup tapes themselves could be damaged, lost, or stolen. These recommendations are an attempt to improve XYZ Computer’s network data security, prevention of data loss, protection against network failure, and contingencies for natural disasters.
First and foremost, there has already been an incident where the network servers were damaged due to flooding in their physical location. It is then logical to start by redesigning the physical configuration of the servers, placing them on a higher level floor (assuming there are several floors to the XYZ Computer’s company building). Relocating the IST department should not be a lot of trouble, but will prove to be a valuable strategy to prevent network

You May Also Find These Documents Helpful

  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    a. Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. As well as having a backup and retention site to work from, and recover from for the main servers and web services.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Above is a table that list the six departments. There is also a breakdown of the workstations and 26 printers per department.…

    • 887 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Update all anti-virus software Security Policy needs to be documented and implemented Weak user passwords need to be strengthened Proper security personnel Wrong building fire protection needs corrected Remote access needs to be hardened with VPN restrictions II. No Plan…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    1. Information Systems Manager. The objective of this project is to develop an integrated system to improve day-to-day operations of Spa Works as well as to offer better reporting in the accounting and human resources. As a result, the IS manager of Spa Works has been chosen to serve on the committee to ensure the strategic IS planning is aligned with the company’s overall strategy. IS manager will advise on the hardware and software (software upgrades) that must be purchased to ensure smooth functionality of the system applications. The IS manager will also endorse an effective and efficient system design so that everyone across the organization is able to use it trouble-free. Being on the advisory board, IS manager will facilitate proper security and recovery software and will develop strategies for training the existing and new personnel if required. Spa Works’ IS manager will also ensure that a set of adequate IT policies is in place and the new system complies with…

    • 1046 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Sub 2 Assessment 1

    • 2457 Words
    • 8 Pages

    From the above table we can see that in this company no one has really been responsible for the computers and each sales office has been allowed to do their own thing provided they had the budget to cover the cost. At head office, each department had acquired PCs and about two years ago they were networked using the services of a local Systems Integration firm called Wollocomp who has provided support as required since then.…

    • 2457 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Townsend & Townsend

    • 577 Words
    • 3 Pages

    There is also another issue, the segregation of duties within the IT department as this is a great concern as it can create a high possibility of unauthorized changes, therefore reducing the integrity of the data and a lack of accountibility among the IT employees. We would recommend that you clearly define the duties and restrictions among the IT staff and monitor these…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Disaster Plan It

    • 1313 Words
    • 6 Pages

    123 Textiles Corporation is located in a high-crime area that also experiences occasional earthquakes. A new network was set up with the server by a window. All systems are backed up once a month on an exterior drive. One night, a thief entered through the window and stole the server.…

    • 1313 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    A proposal for improving IDI’s computer network infrastructure is the purpose for this proposal. This project is intended to be used by IDI’s information security team to developing a plan to improve IDI’s computer network infrastructure at multiple locations.…

    • 1206 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    In order to reduce the risks and vulnerabilities of each location, we must implement access control to ensure confidentiality, integrity, and availability. For the Billing, Montana location we have to consolidate 14 Hewlett Packard Unix servers to 1 UNIX server. Upgrade 75 Microsoft Windows servers to Windows server 2008 R2. Upgrade MS exchange e-mail to latest version. We must find another software vendor to replace Oracle financials for accounting and financial systems, Logisuite 4.2.2, and RouteSim. We have to hire developers to standardize the office automation hardware and software. Convert telecommunications system to a VOIP system. Design and implement a new Acceptable Use Policy (AUP) and upgrade WAN to a T1 MPLS to increase bandwidth. The Warsaw, Poland location, we must…

    • 622 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Hospital Disaster Plan

    • 1879 Words
    • 7 Pages

    Gulf Coast HospitalThe Gulf Coast Hospital, a 350-bed facility, is located in New Orleans, Louisiana along the Gulf coast. The Gulf coast has been hit with numerous hurricanes and tropical storms and in 2005 Katrina hit land. Hurricane Katrina was the deadliest and most destructive Atlantic tropical cyclone of the 2005 season and made her way onto the shores of the Gulf coast on the morning of Monday, August 29, in southeast Louisiana. The storm surge was the cause of much of the destruction. The levee system catastrophically filed resulting in major flooding and destroyed the patients files stored in the basement of the hospital.…

    • 1879 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    In the past the Chicago Tribune maintained applications for their operations on mainframes at two different locations. This was causing the mainframes to be underutilized and was costly to maintain both systems. While merging the 2 systems the Chicago Tribune experienced a five hour outage…

    • 1158 Words
    • 5 Pages
    Powerful Essays