欢迎来到留学生英语论文网

客服信息

我们支持 澳洲论文代写 Assignment代写、加拿大论文代写 Assignment代写、新西兰论文代写 Assignment代写、美国论文代写 Assignment代写、英国论文代写 Assignment代写、及其他国家的英语文书润色修改代写方案.论文写作指导服务

唯一联系方式Q微:7878393

当前位置:首页 > 论文范文 > Security

Disaster Plan

发布时间:2017-03-15
该论文是我们的学员投稿,并非我们专家级的写作水平!如果你有论文作业写作指导需求请联系我们的客服人员

Having a disaster recovery plan for 123 Textile Corporation that operates in a high-risk area that is located in a high-crime area in which has frequent earthquakes will better protect the organization's technological assets. The server for this company is currently installed next to a window where it should be an apparent security issue in itself. The company recently experienced a break-in during the last earthquake, which knocked out power to this section of the city. This earthquake and crime resulted in property vandalism and theft of the company server.

The 123 Textile Corporation chooses to backup its data once a month, but even data that does not represent a company's backbone should be backed up at least once a week. The company's backbone data should be backed up at least once a day if not have a program that will allow for updates periodically throughout a day. Throw in that occasional earthquake with the crime committed makes for the 123 Textile Corporations in desperate need for a disaster recovery plan.

When addressing the disaster plan, the first step in the recovery plan is to put the server in a more secure and safe place to protect this organization's technological assets. For instance, behind a locked door and installing a locking server rack. Server racks are available from multiple companies ranging in price and size whereas optimal protection against shock and falling objects is obtained by purchasing a sturdy steel rack and anchoring it to the building's foundation. Having the server secured by either, a rack or in

Disaster Plan 3

a locked server room will provide more security than that of having it in the open near a window. The server would be behind a solid door with a dead bolt. Anyone who requires access to the server would require a key and a password, which the supervisor or higher and the network administrator will have possession of. With the steel racks, password, and keyed entry this would provide as much protection against data being lost, stolen, or damaged than that of before.

The server will also need an uninterruptible power supply to ensure the security of the data. The power supply is connected in series to the server and protects against a variety of electrical supply problems, such as power surges, blackouts, etc. A local electrical company can install a small low cost back-up electrical generator that will allow the server to continue running for a short period. These generators will turn on automatically when a power failure should arise. Although most of the small generators are not designed to provide power support for long periods of time however they will allow enough time for the network administrators to save the data and shut down a server normally to ensure proper working condition when the normal power supply is restored. Electrical problems can cause loss of data, corrupted files, and even permanent hard drive failure that can be detrimental to the company when not backed up properly.

Disaster Plan 4

There are an array of inexpensive disks or RAID that can provide a solution if one of the hard drives fail. In a RAID setup, two or more hard drives save the exact same data that allows for improved performance since one disk can be accessed for writing purposes while the other is being read because of a requested service. An appropriate RAID configuration for 123 Textiles Corporation is RAID 1. In RAID 1, two or more hard disk drives mirror each other and are therefore completely redundant. Should one disk fail, the other will still be able to maintain the network until the failed disk can be replaced. Many RAID disk controllers can even take a failed disk off the network, format it, and then rewrite data from the working disk to the repaired disk. I would recommend a rack mount system called the Fusion from Sonnet. The Fusion R400P enclosures employ a high performance SATA II port multiplier to manage the enclosed drives while just a single locking data cable connects the enclosure to a SATA host controller card. This efficient interface simplifies setup and cuts cable clutter while offering a significant improvement in data speeds. This set up is compatible with Windows, Mac, and Linux OS.

The generally accepted methods of a tape backup drive and cassettes have alternatives with many companies offer off-site server backup. These sites referred to commonly as hot sites and cold sites, depending on personnel are located at the facility and what the site offers. A cold site is the most inexpensive type of backup site for an organization to operate. It does not include backed up copies of data and information from the original

Disaster Plan 5

location of the organization, nor does it include hardware already set up. The lack of hardware contributes to the minimal startup costs of the cold site, but requires additional time following the disaster to have the operation running at a capacity close to that prior to the disaster.

The more expensive of the two is the hot site. A hot site is a duplicate of the original site of the organization, with full computer systems as well as near-complete backups of user data. Real time synchronization between the two sites is used to completely mirror the data environment of the original site using wide area network links and specialized software. The hot site exists so that the organization can relocate with minimal losses to normal operations. A hot site will be up and running within a matter of hours or even less. The capacity of the hot site may or may not match the capacity of the original site depending on the organizations requirements.

Hot sites are popular with organizations that operate real time processes such as financial institutions, government agencies and ecommerce providers. IBackup is a company that offers solutions to implement hot sitesbased disaster recovery even for small to medium sized businesses. 123 Textile Corporation can setup an office to another branch office or even to the network administrator's home hot sites solution. IBackup mirrors data between two sites, for any quantum of data, executed at frequency levels set

Disaster Plan 6

by the company.

When the hardware requirements of the disaster recovery plan are in place, the security software is ready to be implemented. Standard security software includes a firewall and antivirus program. A firewall is used to keep unauthorized users from gaining access to the network's resources, data, computers, servers, and programs. An antivirus program will help ensure viruses and malware cannot make a home on the network and possibly compromise the network's security. There are many antivirus programs available to the consumers such as McAfee and Norton. Both of them are reasonable in cost around $100.

123 Textile Corporation operates in a high crime area of the country. To minimize losses incurred from crimes, a security system that includes alarms, cameras, emergency lighting, and a notification system to the fire and police departments, also having the owner or administrators notified. This security system alarm will sound when someone enters the building without deactivating the alarm. Alarms are available that can sound even when windows are broken, if there is a fire, flood, or any of disaster. Having cameras in select areas of the building will also help identify anyone that breaks in. Many cameras also have video surveillance features. These cameras can be tied into the server and their video surveillance data backed up along with the rest of the company's

Disaster Plan 7

data. Surveillance video could prove useful in recovering lost, stolen, or damaged data or items resulting from vandalism or disasters.

When the security of the network is in place, the network administrator will implement passwords, usernames, and security levels on the network (data and program access). The network administrator will be responsible for determining how much of the 123 Textile Corporations data needs backed up, how often the backup will take place, and who is responsible for completing the backup.

The administrator may set restrictions on user names and passwords that may include a minimum character length and/or a mix of upper and lower case letters and numbers or symbols. Passwords should be set to expire and reset every so often to help minimize the risk of hackers obtaining them.

Social engineering can also present a threat to a networks security, telephone users should not give out anyone's last names including theirs, unless they are certain the person on the other end is a reliable source and they are secure. Passwords and usernames are to remain unknown by everyone except the supervisor and network administrator. No employee shall give their information to anyone since the supervisor and network administrator already have them through a security feature. A password-protected

Disaster Plan 8

screensavers can be implemented in the event that a workstation is left abandoned and idle. These screensavers can be set to as little as 30 second's idle time before the password needs reentered.

Disaster Plan 9

References

  • Cignoli, C. (2009). Disaster Recovery News: Data deduplication makes disaster recovery and data replication easier. Retrieved on October 18, 2009 from http://searchdisasterrecovery.techtarget.com/news/article/0,289142,sid190_gci1370324,00.html N.A. (2005) Glasshouse Whitepaper: Storage Security Best Practices. Retrieved October 18, 2009 from http://www.glasshousetech.com/whitepapers/wp_storage_security_best_practices.pdf
  • 上一篇:返回列表 下一篇:CVE-2005-0551