SUMMATIVE ASSESSMENT WEEK 5
docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
110
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by JudgeBoulder13808
Chasity Padilla
Dr. Tim Perez
March 25, y
Disaster Recovery Plan
Week 5 Summative Assessment
Having a disaster strike can be devastating to business operations, es-
pecially when dealing with potential loss of data. It is, unfortunately, an ex-
pected part of business operations when the company relies on technology for its operations. Fortunately, though, there are safeguards we can put in place to try and curb any interruption in activity and ensure business conti-
nuity as normal. The creation of a disaster recovery plan outlines all proce-
dures, policies, and guidelines in case of an emergency making it so that em-
ployees know what to do if and when a disaster occurs as well as setting the recovery up for success with the best possible outcome.
Firstly, implementing the use of cloud storage of business information is paramount to business success. Cloud storage is the electronic storage of data that can be accessed remotely. There are numerous options to choose from when picking a cloud service such as Amazon Web Services (AWS). The upload of information to these kinds of services is critical for non-interruption
as it ensures there is a constant backup that can be accessed in case of an emergency. Backups, which the IT department manages and is responsible for, are the data that lives on these cloud services. There is the question of how often data should be backed up and uploaded, and it directly correlates to the importance and sensitivity of the information that’s being backed up. The more important the data, the more frequently the data needs to be backed up. At the very minimum, it should be done daily to minimize the risk
of lost data, but again, as the delicate nature of the information increases, so
WEEK 5 SUMMATIVE ASSESSMENT
1
does the rate at which the information should be uploaded. Cloud service is much more than just storing backups. It’s on-demand access to servers and services (as well as storage) to customers as well as the companies who uti-
lize them. This is incredibly convenient when it comes to data restoration as it wouldn’t take an awful amount of time to create a new server if need be, and transfer the necessary data to continue operations. Now, the amount of data that needs to be transferred will affect the speed at which it is avail-
able, but it is still very quick. Using these services also makes it so the infor-
mation is stored offsite in case of a disaster. This means that the data would be unharmed and still accessible while efforts are being made to get it back for business operations.
A second tool that can be used for backup purposes is using offsite backup. As the name implies, this is the storage of information away from the main data processing center as it’s highly unlikely that the two locations where this information is being stored would be affected by the same disas-
ter. Companies usually have backup data processing centers that would be available for information recovery. There are three main types which are Hot,
Cold, and Warm Sites. Hot Sites are a duplicate of the main processing cen-
ter with all the necessary equipment and information needed to continue business operations, which is the best option for continuity purposes, but may not be financial as it is quite costly. Activation of a Hot Site is quite fast and convenient as it minimizes the delay of service. Cold Sites are at the op-
posite end of the spectrum where the equipment is available, but the infor-
mation is not, and activation is much less immediate and can take up to a few months for them to be fully operational. These are good for companies that don’t want to or aren’t able to invest in a Hot Site. It’s good for budget but is extremely slow to get running. Right in the middle are Warm Sites which hold the same convenience as Hot Sites with all the equipment and data, but unlike Hot Sites, is not up and running, and it can take a few hours to a few days for it to restore business needs.
WEEK 5 SUMMATIVE ASSESSMENT
2
Data at rest will be protected by using encryption methods. Encryption makes it so that the data is unavailable to anyone who isn’t authorized to ac-
cess it. Permissions could be set so that no one under a certain clearance level can obtain certain information. If for whatever reason, a hacker did hap-
pen to get an encrypted file, it would be useless to them because it would be
unreadable. For example, Apple has an option to encrypt your device back-
ups which contain sensitive information such as saved passwords and web-
site history. These backups are only able to be accessed by a password set by the owner of the device/account; not even Apple can access the informa-
tion without that password. This is perfect for business needs as it limits the availability of whatever information was encrypted to only people who should
have access to it. There is also the method of setting up password expira-
tions which forces those with access to change their login information period-
ically to try to limit those who eavesdrop and sneak around from using other employees’ login information because it’s constantly changing. Some compa-
nies have moved on from this method and allow their employees to keep the
same password until they decide to update it, however, there are quite a few
who implement the expirations because it’s more secure.
Concerning disaster recovery, the information should all be recovered as
immediately as possible, however, the efforts for restoring business activity don’t cease once the data is back where it should be. The immediate focus will be to get business operations up and running as usual for customer sup-
port, but research needs to be done to see how what happened occurred and
what safeguards can be put in place to prevent it if possible. If the former office space is no longer available, something that has become increasingly popular since the start of the pandemic is working remotely. It has attractive qualities, the main one being that is incredibly convenient to not have to leave home for work to be completed. Companies may also have a better time finding employees to work when there isn’t a location restriction as their choices increase without a specific place requirement.
WEEK 5 SUMMATIVE ASSESSMENT
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
The major components of a backup storage policy including data at rest are as follows. Knowing what data to back up and how often to do so is ex-
tremely important. As previously mentioned, the more sensitive the informa-
tion is, the more frequently it should be backed up, however on the other side of the same coin is making sure that unnecessary information isn’t be-
ing uploaded as it wastes space that could be used for other important data. Prioritizing the data for backups is critical for business performance. It also needs to be determined where these backups will be located, whether it’s in cloud storage or an offsite location. These backups also need to be tested regularly to ensure that they can be used efficiently when restoring data. They need to be checked for any potential problems that may make restor-
ing business operations an issue. Encryption of data at rest ensures that the information can only be accessed by those who are approved to view it.
The labs from this week provided helpful information necessary to cre-
ate a disaster recovery plan, including prioritizing data backups and methods
of protecting data at rest. The tools taught this week as well as in previous weeks are paramount to information security and business success, and this disaster recovery plan is key in ensuring business continuity in case of an emergency.
WEEK 5 SUMMATIVE ASSESSMENT
4
CITATIONS
i.
Apple (2024, March 4). About encrypted backups on your iPhone, iPad, or iPod touch. Retrieved March 20, 2024, from https://support.apple.
-
com/en-us/108353
ii.
Chapple, M. (2022, October 26). Cert Prep: ISC2 Certified in Cyberse-
curity (CC). In Learning. Retrieved March 20, 2024, from https://
www.linkedin.com/learning/cert-prep-isc2-certified-in-cybersecurity-cc/cy-
bersecurity-15121230?leis=LTI13&resume=false&u=74653506
iii. Bibliu (2022). Certified Secure Computer User V3 Complete Series. Retrieved March 20, 2024, from https://bibliu.com/app/#/view/books/
B1BBFTRMHS1FA/pdf2htmlex/index.html#page_1
WEEK 5 SUMMATIVE ASSESSMENT
5