Preview

Disaster Recovery Research Paper

Better Essays
Open Document
Open Document
1817 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Disaster Recovery Research Paper
Essay 8-1
Understand the aspects of disaster recovery Disaster recovery is concerned with the recovery of critical systems in the event of a loss. Be able to discuss the process of recovering a system in the event of a failure A system recovery usually involves restoring the base operating systems, applications, and data files. Be able to discuss the types of alternative sites available for disaster recovery. The three types of sites available for disaster recovery are hot sites, warm sites, and cold sites. Be able to describe the needed components of an incident response policy the incident response policy explains how incidents will be handled, including notification, resources, and escalation. Full Backup A full backup is a complete,
…show more content…
It is sad but true: One reason administrators don't put as much security on networks as they could is because they do not want to have to deal with the false positives. As a security administrator, you must seek a balance between being overwhelmed with too much unneeded information and knowing when something out of the ordinary is occurring. Although collecting as much information as possible is important, no one can be blamed for trying to protect their data. While it may be admirable to catch a crook deleting your data, if you can keep the data from being deleted, you will stand a much better chance of still being employed tomorrow.
Step three: Repairing the Damage
Most operating systems provide the ability to create a disaster-recovery process using distribution media or system state files. The user updated all the programs in his computer and also updated his antivirus software; however, he's still reporting unusual behavior in his computer system. The user has probably contracted a worm that has infected the system files in his computer. When the scan is complete, help the user reinstall data files and scan the system again for viruses. ClamAV is an open source solution once available only for Unix-based systems that is now available for most operating systems.
Step four: Documenting and Reporting the
…show more content…
Failing to do so can result in privilege creep (also known as access creep, referenced earlier), which occurs when an individual accidentally gains a higher level of access than they would normally be entitled to or need.
Usage auditing: Verifies that systems and software are used appropriately and consistently with organizational policies. A usage audit may entail physically inspecting systems, verifying software configurations, and conducting other activities intended to prove that resources are being used appropriately. Periodically inspecting systems to ensure that software updates and patches are current and that only approved software is installed is a good idea.
Escalation audits: Help ensure that procedures and communications methods are working properly in the event of a problem or issue. These types of audits test your organization to ensure that it has the appropriate procedures, policies, and tools to deal with any problems in the event of an emergency, catastrophe, or other need for management intervention. Disaster recovery plans, business continuity plans, and other plans are tested and verified for accuracy. To successfully complete your assignment, you'll need to inspect every user account and group to verify which user accounts

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. As well as having a backup and retention site to work from, and recover from for the main servers and web services.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    =: No Disaster Recovery Plan: No failover = all data gets lost in a crash No backup in place…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    It244 Appendix.D

    • 929 Words
    • 4 Pages

    Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. Disaster recovery is a subset of business continuity. While business continuity involves planning for keeping all aspects of a business functioning in the midst of disruptive events, disaster recovery focuses on the IT or technology systems that support business functions.…

    • 929 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    FXT2 Task3

    • 1454 Words
    • 7 Pages

    The Disaster Preparedness plan was not written as thoroughly as possible and left little direction to the disaster recovery team. it was missing major information, such as a list of critical services, Employee contact information and vendor contact information. The Business Impact analysis for this type of scenario or any disaster was never completed so there was little information to help the disaster preparedness team as far as how this disaster will impact the organizations operations. The Backup Policy was written thoroughly and included information on the backup schedule and storage locations. It also listed the backup methods used and the length of time full backups were kept for. The document also included instructions to restore data from both differential and full backups, but did not address what to do in a disaster scenario such as this. Lastly, the document does not address…

    • 1454 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    BIS261 Final Exam Paper

    • 1552 Words
    • 7 Pages

    Audit – performed by outside independent party to verify that a critical system complies with certain standards…

    • 1552 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    For common indications that a virus might be present, Administrators and users need to be on the alert for missing files or programs; unexplained changes to the system’s configuration; unexpected and unexplained displays, messages, or sounds; new files or programs that suddenly appear with no explanation; memory “leaks or unexplained use of disk space; and any other odd behavior of programs or the operating system. If a virus is suspected, a good antivirus program should be installed and run to scan the system for viruses and attempt to remove or quarantine any that are found. in case all these measures fail, all mission-critical or irreplaceable data should be backed up on a regular basis.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Complete the Disaster Recovery Plan (DRP) portion of the Information Security Policy. Include the following:…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit Btec Diploma It

    • 950 Words
    • 4 Pages

    Audit logs: Audit logs allow computer administrators to get a good idea of where visitors are coming from, how often they return, and how they navigate through a site…

    • 950 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    A few security breaches that the employees practiced where visible and the sharing and displaying of username and password information on post it notes. They should not have this information in clear view and should change them often. Employees where making the mistake of leaking information and visiting malware sites. They were also using common passwords which showed their lack of training. They need to be trained in network security and a strong policy needs to be enforced.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Testing and monitoring security controls can come in different factors. Monitoring security is by far important because you need to know what’s going on before you can announce it. Networking abuse is by far the biggest baseline anomaly. For employees who have access to the internet, the network can be used to stream media, to access social websites and to download unauthorized software or free software which has vulnerabilities a long with that.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As the 2 year anniversary of the devastation resulting from hurricane Katrina approaches and a new hurricane season gets underway. What can Americans living in coastal areas do to prepare? Careful consideration should be given not only to preparation for physical survival in the hurricane but also to how to survive in the aftermath of the storm. Hurricane Katrina caused 81.2 billion dollars in damages and an estimated 1,836 people lost their lives.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hurricane Sandy was the biggest hurricanes to ever hit the east coast let alone the world. Sandy was a storm consisted of two storms, because it was a tropical storm before it became a “Frankenstorm”. Then it became a class 1 hurricane. Sandy broke records for highest storm surge, biggest wave, and many more. Sandy killed at least 140 people, and cost over 40 million dollars in damage. Sandy affected many countries including Canada, U.S.A, and some countries in the Caribbean, taking over a week to disapparate. Sandy overall was one of the biggest natural disasters ever.…

    • 994 Words
    • 4 Pages
    Good Essays
  • Better Essays

    I have chosen scenario 2 for the natural disaster on the Gulf Coast. Though my patient files were destroyed from the hurricane, I am still responsible for having a system in place to secure patient information. Upon completion of reading this essay, one will discover that disaster recovery plan will state how operations will be conducted in an emergency, which workforce members are responsible for carrying out said operations, how data will be moved and retrieved without violating HIPAA standards for security and privacy, and how data will be safeguarded and restored (Rouse, 2010). In addition, my disaster recovery plan will include provision for staff training, a code of conduct, and implementation of my plan.…

    • 1269 Words
    • 6 Pages
    Better Essays

Related Topics