Data Disaster Recovery
Trang Thu Nguyen
CIS -125 Telecommunication Concepts
Prof. Abdur Iqbal
Spring 2015
ASA College, New York
Table of Content
Introduction
Security Vulnerability
Security Measures
1. Data Backup
2. Hard Drive
3. Peer-to-peer Backup
4. Cloud-based Backup
5. Back up multiple versions
Recovery Startegies
1. Internal Recovery Strategies
2. Vendor- based Recovery Strategies
Conclusion
Bibliography
Introduction
Data recovery is one of security planning that enable the continuity and recovery of data and technology after a natural or human-induced disaster (..) Businesses nowadays face multiple attacks, thus, data recovery is essential in any business continuity plan. This paper will discuss the security threats that businesses are facing and the appropriate data recovery strategies that come with.
The Importance of Data Disaster Recovery
An IT disaster occurs when a business’s mission- critical system is not available. An IT disaster may be nature- or human- induced. Natural disaster including fire, hurricane, flood, earthquake, tornado etc. can damage the IT physical infrastructures. Fire is reportedly one of the most common catastrophic events that can interrupts a business operation (....) Human- induced disaster include terrorist attacks, deliberate criminal activities etc. An IT disaster can have serious consequences to a business if not being addressed timely and correctly. Apart from loss of existing data,
event of a catastrophic disruption (fire) or disaster (hurricane) and a major IT or data center outage occurs
The Data recovery document should be refined to include the priority of data restoration when all business functions have been compromised
Because Aircraft Solutions has valuable intellectual property, the cost of data loss can be astronomical. In fact, 17 percent of data loss incidents cannot be retrieved. It is worth noting that the value of the lost data varies widely depending on the incident and, most critically, on the amount of data lost. Should AS experience a data loss, it may take hundreds of man-hours over several weeks to recover and reconstruct. Such prolonged effort could cost a company thousands, even potentially millions, of dollars. Although it is difficult to precisely measure the intrinsic value of data, and the value of different types of data varies, several sources in the computer literature suggest that the value of 100 megabytes of data is valued at approximately $1 million, translating to $10,000 for each MB of lost data (Smith, 2003). The National Archives and Records report that 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
In a generalized form, incident handling is responding to an attack done by an individual or an organization. If the system attack is been organized and executed carefully then there are chances of getting all the data recovered if not then it may lead to total disaster. There are basically two common forms of system
When taking a look deep into an organization’s different departmental operation, it becomes clear how to plan to protect the most data and also which areas is more operation critical. While preventing interruption is the most important aspect of this plan, no one can predict the weather or any other attack. As part of the steps to implement the business continuity plan, Sunshine Machine Works will need to document a risk management plan, business impact analysis, incident response plan, plan activation, incident response team, communications, contact list and recovery plan section. Once all has been documented, the organization will need to test, evaluate and update schedule.
Every business and organization can experience a serious incident which can prevent it from continuing normal operations. This can happen any day at any time. The potential causes are many and varied: flood, explosion, computer malfunction, accident, grievous act... the list is endless.
Security measures to be input into the firm to boost disaster recovery process include establishing firm registry in bomb proof vaults that will shield the firm’s documents and data from disasters such as terrorist attacks. Such will ensure that the records of the firm are not tampered with and as such the company is able to run business without fundamental data loss (Menken and Blokdjik, 2010).
This paper 's theme is the identification and analysis of critical IT issues facing business. The content of investigation and analysis will include three key corporate IT issues, methods of problem identification, and the rationale for selecting the issues. This overriding critical IT issue facing the Fox Television network and cable affiliates is disaster recovery. The organization of the three topics explored the problem, the investigation of the situation, and resulted in a solution. Many may consider that the exploration of the television distribution systems is not related to traditional IT components. However, many elements in the traditional television distribution facility are changing to using IT components and the
Disaster recovery is the process of an organisation uses to recover access the data, and also hardware that are needed to recollect the performance to be in normal position after a disaster occurs. While disaster recovery plans have to be focus in every aspect in any organisation and bringing the gap closure after destruction it can be like data, hardware, or software have been lost and the manpower that composes much of any organisation.
Disaster Recovery Planning is the critical factor that can prevent headaches or nightmares experienced by an organization in times of disaster. Having a disaster recovery plan marks the difference between organizations that can successfully manage crises with minimal cost, effort and with maximum speed, and those organizations that cannot. By having back-up plans, not only for equipment and network recovery, but also detailed disaster recovery plans that precisely outline what steps each person involved in recovery efforts should undertake, an organization can improve their recovery time and minimize the disrupted time for their normal business functions. Thus it is essential that disaster recovery plans are carefully laid
Owning a business can have many stressors day to day. When starting a business there is a lot of planning and preparation involved. Many small businesses are owners who have put their own money into the business and look at it as an investment. Unfortunately with all the planning that goes into starting a business, one thing is often over looked. Most of the time the “what ifs”, are not part of the planning stage. One reason for this is that people do not like to think of the bad things that could or may happen. So with all the time and planning put into starting a business why not put some extra thought into a plan B if a disaster strikes? This plan B could be a business continuity plan or a disaster recovery plan. Business continuity plans are an essential part of the modern day business. There are so many potential disasters for small businesses that could seize the production or even close the business down for good. A recent study from Gartner Inc., found that “90% of companies that experience data loss go out of business within two years. It also found that 80% of company owners have not thought about how they would keep their businesses up and running if a data disaster occurs.” According to the Association of Records Managers and Administrators, “about 60 percent of businesses that experience a major disaster such as a fire close
A large US public power provider, with millions of residential and business customers, needed to rethink its disaster recovery program. Due to budget constraints, the utility’s data recovery program had not been updated or tested for several years. Under the existing program, systems recovery could take up to 20 days—an unacceptable timeframe for a
Various institutions worry about losing their critical, highly restricted and confidential data. The fear of information loss is amplified within an organization especially when their critical data is hosted externally, for example through the use of cloud models. In order to address data loss fear that these organizations will suffer, a security structure called “Data Loss Prevention (DLP)” was developed, this product is available as various products within the information technology field. The most frequently used among these products are, McAfee, Symantec and so on. Each of the following DLP products is used to discover and deter data leakage.
ADRC Data Restoration Tools is another great, free document recovery program. Data file recovery with the program is uncomplicated and may probably be achieved by the common computer individual without any sort of documents. The ADRC Data Restoration Tools can undelete data files from any non-CD/Disc storage space device like ram credit cards and USB drives, as well as hard disks, of course. ADRC Data Restoration Tools is a standalone, 132KB program rendering it a very lightweight data restoration tool that will easily fit on any detachable media it's likely you have.