ICTSAS526_ASSESSMENT1

pdf

School

TAFE NSW - Sydney Institute *

*We aren’t endorsed by this school

Course

ICTSAS526

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

6

Uploaded by ChancellorEnergy8973

Report
DIPLOMA OF INFORMATION TECHNOLOGY ICTSAS526 Review and update disaster recovery and contingency plans ASSESSMENT 1 Project Submitted by KANJANAPORN MEEDAM s2872 Submitted to PRASANNA DAHAL
KANJANAPORN MEEDAM Diploma of Information Technology (Business analysis / Systems analysis) SSBT Burwood ASSESSMENT 1 PROJECT 1. What is the industry standard backup methodologies? Answer: The industry standard backup methodologies include identifying critical data, maintaining multiple copies of data, keeping backups in multiple physical locations, making frequent backups to ensure the minimal or insignificant loss of data, and storing backup data in a secure place. Backup options that can be compared and combined to find suitable solutions include full backup and incremental backup. information on effective backup strategies for disaster recovery and contingency planning. These strategies include: 1. Deciding what data is critical and what needs to be backed up, which involves identifying data on desktop computers, network servers, laptops, wireless devices, and paper records. 2. Maintaining multiple copies of data to ensure that there is always a backup available in the event of a disaster or other emergency situation. 3. Keeping backups in multiple physical locations to minimize the risk of losing all backups in the event of a localized disaster (e.g. fire, flood). 4. Making frequent backups to ensure minimal or insignificant loss of data. 5. Storing backup data in a secure place to prevent unauthorized access or theft. 6. Considering different backup options such as full backup and incremental backup, which can be compared and combined to find suitable solutions for your organization's specific needs. a list of backup options that can be compared and combined to find suitable solutions for disaster recovery and contingency planning. These backup options include: 1. Full backup 2. Incremental backup 3. Differential backup 4. Hot standby site 5. Warm sites 6. Cold storage or cold sites 7. Backup service provider 8. Cloud backup 9. Failover server
10. Tape backup 11. Offsite remote backups 12. Local backups 13. Dedicated in-house backup system These options can be used in combination to create a comprehensive disaster recovery and contingency plan that meets the specific needs of your organization. 2. Discuss the organisational planning process which are relevant to the development of Information and Communication Technology (ICT) business solutions. Answers: The organizational planning process relevant to the development of ICT business solutions is an important aspect to consider. A typical process is shown in the picture which includes the following steps: 1. Identify the business problem or opportunity 2. Analyze the problem or opportunity 3. Develop a solution strategy 4. Design the solution 5. Implement the solution 6. Evaluate and maintain the solution Each of these steps will be studied in greater detail throughout the following sections of this unit. It is important to be familiar with your organization's planning process in order to effectively develop ICT business solutions that meet your organization's needs and goals. 3. Explain an organisational business domain, including the organisation’s existing systems functioning and systems engineering. Answers: An organizational business domain refers to the specific industry or sector in which an organization operates. It includes the products or services offered, the target market, and the overall business model. When accessing information about an organization's existing systems functioning and systems engineering, it is important to examine information in relation to each of the following: 1. The organizational business domain: Gathering information about the client’s business domain is important. Regardless of how good a person’s knowledge is in their own technical
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
field, each business and industry will have differences in the way they operate, resources they use and how they use them. 2. Systems functionality: This refers to how well an organization's systems are working and whether they are meeting their intended purpose. 3. Systems engineering: This refers to the design, development, testing, and maintenance of an organization's systems. By examining these factors, you can gain a better understanding of an organization's existing systems functioning and systems engineering within its specific business domain. 4. Discuss physical security, system failure, accident or sabotage (hackers) and denial of service as components of industry standard disaster recovery plan strategies. Answers: Physical security, system failure, accident or sabotage (hackers), and denial of service are all components of industry standard disaster recovery plan strategies. Physical security refers to the measures taken to protect an organization's physical assets, such as buildings, equipment, and data centers. This includes implementing access controls, surveillance systems, and environmental controls to prevent unauthorized access or damage to these assets. System failure, accident or sabotage (hackers) refers to the potential for hardware or software failures, accidents such as power outages or natural disasters, and intentional attacks by hackers or other malicious actors. To mitigate these risks, organizations should have backup systems in place and regularly test their disaster recovery plans to ensure they are effective. Denial of service (DoS) attacks are a type of cyber attack that involves overwhelming a system with traffic in order to make it unavailable to users. To prevent DoS attacks from disrupting business operations, organizations should implement measures such as firewalls and intrusion detection systems. 5. What industry standard disaster recovery plan strategies and components are used in relation to virus attack and cyber attack? Answers: Virus attack and cyber attack are two components of industry standard disaster recovery plan strategies. A virus attack is a type of cyber attack that involves malicious software infecting an organization's systems. To prevent and mitigate the impact of virus attacks, organizations should implement antivirus software and regularly update it to ensure it is effective against the latest threats. Organizations should also have backup systems in place to restore data in case of a virus attack.
A cyber attack refers to any type of malicious activity that targets an organization's ICT systems, including hacking, phishing, and malware attacks. To prevent and mitigate the impact of cyber attacks, organizations should implement measures such as firewalls, intrusion detection systems, and access controls. Regularly testing disaster recovery plans is also important to ensure they are effective in the event of a cyber attack. 6. Briefly explain telecommunications failure. Answers: Telecommunications failure is a situation where an organization's telecommunications system becomes unusable. This can be due to internal problems or external issues such as problems with telecommunications infrastructure or providers. Having a secondary communication system may be useful, for example, the ability to take EFTPOS payments manually. Backup is essential for recovery. 7. Discuss the contingency arrangements typically included in industry standard disaster recovery plan strategies. Answers: Contingency arrangements are an important component of industry standard disaster recovery plan strategies. These arrangements are designed to ensure that an organization can continue to operate in the event of a disruption to its ICT systems. Contingency arrangements typically include measures such as backup systems, redundant hardware and software, and alternative communication channels. For example, an organization may have backup servers located in a different geographic location to ensure that critical data is not lost in the event of a disaster. Other contingency arrangements may include emergency response plans, which outline the steps that should be taken in the event of a disaster or other emergency situation. These plans may include procedures for evacuating personnel, securing critical assets, and communicating with stakeholders. 8. Briefly outline the key workplace health and safety requirements relevant to the plans for disaster recovery and contingency. Answers: Workplace health and safety (WHS) is an important consideration when developing plans for disaster recovery and contingency. There are several key requirements that organizations should be aware of when developing these plans. Firstly, organizations must ensure that their disaster recovery and contingency plans do not create additional risks to the health and safety of their employees or other stakeholders. This
may involve conducting risk assessments to identify potential hazards and implementing measures to mitigate these risks. Secondly, organizations must ensure that their employees are adequately trained in the procedures outlined in the disaster recovery and contingency plans. This may involve providing training on emergency response procedures, evacuation protocols, and other relevant topics. Finally, organizations must ensure that they comply with any relevant WHS legislation or regulations. This may include requirements around emergency planning, risk management, and incident reporting. 9. What legislative requirements are relevant to disaster recovery and contingency plans? Answers: Legislative requirements are an important consideration when developing plans for disaster recovery and contingency. All organizations are subject to legislative – or statutory – requirements, and severe ramifications and losses can occur if they are not adhered to. Therefore, they must be identified and evaluated. Legislative requirements include those prescribed by laws such as workplace health and safety (WHS), privacy and confidentiality, banking, reporting, duty of care, and other relevant legislation or regulations. To work out which statutory requirements apply to your organization's disaster recovery and contingency plans, it is important to communicate with relevant managers and develop an understanding of the environment and industry. 10. How can you identify organisational requirements? Answers: Identifying organizational requirements is an important step in developing plans for disaster recovery and contingency. To identify these requirements, it is important to consider the specific needs and priorities of your organization. One way to identify organizational requirements is to consult with relevant stakeholders, such as managers, employees, and customers. These stakeholders can provide valuable insights into the specific risks and challenges that your organization may face in the event of a disaster or other emergency situation. Another way to identify organizational requirements is to conduct a risk assessment. This involves identifying potential hazards and assessing the likelihood and potential impact of these hazards on your organization's operations. Based on this assessment, you can develop strategies for mitigating these risks and ensuring that your organization is prepared for a range of different scenarios.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: SDS-PAGE separates proteins based primarily on which of the following characteristics: a. their…
Q: ebra.org/lti/launch 5 -4 -3 -2 W 6 Y 5 4 -3 2 1 -1 0 L -1 -2 -3 -4 -5 -6 1 (1, 1) 2 3 4 (4,3) 5 X 6…
Q: Question 15 Find the work done by F over the curve in the direction of increasing t. F = Zi + -j +…
Q: 9. Data plotting with Excel and Matlab In order to quantify the effect of fertilizer on pepper…
Q: Write a quadratic function h whose zeros are -5 and -4
Q: In the enzymatic activity assay performed for malate dehydrogenase, an absorbance of 0.6 (measured…
Q: Use the References to access important values if needed for A student ran the following reaction in…
Q: Which of the following is an example of unearned income? Compensation received b a self employed,…
Q: 13.169 The river flows north at 3 m/s. (Assume that the current is uniform.) If you want to travel…
Q: If a set S has n > 3 elements, how many subsets of S have more than one element, but less than n…
Q: A small business buys a computer for $2700. After 4 years the value of the computer is expected to…
Q: Government has limited power to use spending to correct economic problem mostly because: the economy…
Q: An experiment consists of randomly selecting a set of 5 letters from the 26 letters in the English…
Q: Consider the following binary operation (denoted *) defined on R. Determine whether or not the…
Q: lon Sodium Inside concentration (mM) Outside concentration (mm) Potassium 125 Chloride 13 15 lon a.…
Q: What happened to equilibrium prices and quantities in the market for Audis, which is widely known to…
Q: What is the free energy change in kJ for the reaction below? 2 ClO3−(aq) + 12 H+(aq) + 5 Co(s) →…
Q: When 12.0 mL of a 1.51×10-4 M copper(II) chloride solution is combined with 15.0 mL of a 7.02×10-4 M…
Q: MAT 143 Worksheet 10.1 Please show all work and submit with this document. Upload as a single…
Q: A Ringer's solution contains the following concentrations of cations: 143 mEq/L of Na+, 4 mEq/L of…
Q: Which of the following, found within the interior of cytosolic proteins, is the most dominant…
Q: Consider the following binary operation (denoted *) defined on R. Determine whether or not the…