DISASTER RECOVERY EXAM 2 SPRING 2015
Question 1
a) Backup options
There are several options available to an organization or an individual where data may be stored as a backup, the method storage is chosen depending on data size, associated cost and the recovery method. One can choose either online backup mainly cloud based systems, hard disk, DVD/CDs and magnetic tape. Each of these media of storage has its advantages and disadvantages as explained below:
Online backup: this is a type of storage that that is classified as offsite storage and has been made possible by the interconnectivity of computers via the internet, in this type of storage data is usually uploaded in a cloud based server and can be accessed anywhere as long as one has an
…show more content…
In this method there are several ways in which it can be done depending on the software and hardware capabilities at the disposal of the organization, the easiest type of data backup is through disk partition where data available in one partition can be stored in another partition of the same hard disk, another method which is easier is by use of external hard disk systems whereby data backup can be done at the close of business either daily or at some scheduled time when the machines are not very busy. An alternative method of data backup using hard disk is by use of RAID if the computer hardware and software can allow this mode of data backup. Advantages of hard disk storage includes the following: Lower Cost – the cost of purchasing external or any kind of hard drive has been on the downward trend for quite some time and therefore this method of data backup in terms of acquisition is the cheapest; Quicker File Transfer – New technology and USB 3.0’s high transfer speed enable your files to move around quickly. Whether it’s your HD video collection you want to back up or a huge number of spreadsheets, rest assured that your files will be transferred within hours; One Time Cost – If you’re on a budget, hard drives can be a wise choice since you only have to pay once for huge amounts of data. …show more content…
The advantage of this model is that the time lag after disaster declaration to full recovery after disaster occurrence is very short, while the main disadvantage are cost associated with contracting or acquisition of duplicate facilities.
Warm backup site: in a warm backup site, this is more a hardware storage facility whereby nearly everything available in the primary data center can also be found there. advantages of this system is that restoration to full working capacity can be done in a reasonable time after disaster, while the shortcomings of this method is that cost of maintaining equivalent hardware to that at the main data center and keeping it fully updated at all times.
Cold backup site: this is a model whereby an organization leases another facility for its operations immediately after disaster has occurred and then organize for new hardware’s in order to continue with its normal business operation. The advantages of this method is minimal cost since expenses are incurred only when disaster occurs, while itd disadvantages are there will be delayed full recovery after disaster since the required resources are difficult to source and configure everything to what was there before the disaster took
The idea of accessing, storing, and processing data from online server or virtual server instead of local server is called as Cloud computing. When we store data in our hard disk which is very near to computer that is called as local storage and computing but Cloud computing doesn’t access data from our hard disk.
1.1 Describe Systems and Procedures for Storing and Retrieving Information Collect documents to be filed, sort in to alphabetical, numerical or chronological order, find the relevant file and place the document inside after it’s divider, and return the file to its original place. Confidential files should be kept in a lockable cabinet and old documents should be shredded after the length of time outlined by the organisation. Electronic filing is similar but on the computer. It is important to name files so that they are easily recognisable by everyone who may need to access it. If the information is confidential it should be encrypted with a password to prevent unauthorised access.
5. Regular off-site backup – Ask if they provide backups and how far away the backups are physically
On October 31, 2016 the complainant walked into the Fifth District police station and reported that on October 28, 2016, Tavante Robinson hereinafter referred to as the respondent had sent threatening texts to another teacher at the school. One of the text messages read “Don’t think it’s over u wanna be in this to say nm idgaf I got you Ms. tabias Ms. Hayward all yall mfs don’t think its sweet I left my mother ima be waiting for her to step foot out that mfn building ima get yall one by one.” The message was then followed by the defendant sending pictures of several guns and in one of the pictures he was holding a gun with an extended magazine. The respondent then sent another text messages stating “Tell Ms. Ashford to look into finding some new teachers staff period.” The complainant is afraid for her safety and believes that the respondent can carry out the threat. The respondent has mental issues and believes he has access to weapons. The complainant was provided these text messages a day later after the incident occurred.
Please be sure to make a copy of your work. If you have submitted assessment work electronically make sure you have a backup copy.
...includes data security and other information data related systems. It is for this reason where business continuity development plans today have standby battery powered-backups to supply power just in case the other sources are non-operational.
At my old high school, I would have had a tough time answering this question. My grade point average was my identity, my community engagement was my passion, and campus leadership drove me to reach higher. While all of these qualities are great, I started to lose focus of my other qualities that mattered the most. This changed at the Governor's School for Science and Math. Here I have learned that self improvement and hard work are my best qualities, and I now use them in other areas of my life, such as activities and community.
Initially, I must state the context within which I have been working. The school I am based in is situated in urban area with just over three hundred children present. I am working in a year two class, consisting of thirty children. There is a broad range of abilities that presents its own challenges across the class, there is four SEN children to consider. In the class two SEN children have one-to-one TA’s and one is working from a different timetable from the rest of the school. My elicitation topic was chosen because it was a subject theme that the children had not yet learnt: Body Systems- Skeletal System. I decided to plan for my three profile children plus another child who is very interested in science, this was intended to create
At this location, they would set up all essential functions and run their operations through an additional off-site backup server location (located in a different time zone). Once essential functions are up and running, and there is need, the university may bring in more staff to the hot site in Dallas. Since the coordinating staff will be localized it will be easier to communicate with each other and the campus community post disaster. Once they can reenter the city, facilities personnel will inspect each building and make sure it is up to code before anyone comes back to campus. By having these plans in place and everyone knowing exactly what is
The aim of this report is to theoretical cover data preservation, examination of digital evidence, tools and techniques for data capture, preservation and examination with a list of recommendations.
Disaster Recovery Planning is the critical factor that can prevent headaches or nightmares experienced by an organization in times of disaster. Having a disaster recovery plan marks the difference between organizations that can successfully manage crises with minimal cost, effort and with maximum speed, and those organizations that cannot. By having back-up plans, not only for equipment and network recovery, but also detailed disaster recovery plans that precisely outline what steps each person involved in recovery efforts should undertake, an organization can improve their recovery time and minimize the disrupted time for their normal business functions. Thus it is essential that disaster recovery plans are carefully laid out and carefully updated regularly. Part of the plan should include a system where regular training occurs for network engineers and managers. In the disaster recovery process extra attention should also be paid to training any new employees who will have a critical role in this function. Also, the plan should require having the appropriate people actually practice what they would do to help recover business function should a disaster occur. Some organizations find it helpful to do this on a quarterly or semi-annual basis so that the plan stays current with the organization’s needs.
Kantianism and utilitarianism are two of the most popular ethical principals. Both determine how people ought to act in accordance with their actions to other people’s affectedness. Kantianism, discovered by Immanuel Kant, focuses on what is morally good. He comes up with the theory that the only good that is actually undeniably good is good will; everything else is only used to achieve an immoral end. For example, loyalty is not good in hindsight, if one is being loyal to someone that is evil.
In order to fully understand the concept of a contingency plan, there are a few aspects which need to be explored. We must first define what a contingency plan is, followed by an explanation of why contingency plans are so valuable. Furthermore, an analysis of the implementation of contingency plans should be performed. Lastly, a comparison of such plans from other industries should be done, in order to comprehend the differences in both purpose and criteria.
Several types of cloud storage systems have been developed to supporting both personal and business uses. Cloud storage also a model of networked enterprise storage where the data is stored not only in the user's computer, but also in virtualized of storage, which generally hosted by third parties company.
The DBMS function is it has recovery services. It means that if the database is damaged, the database management system will recover the records and all the information. The data and the records need to recover and backup so that it will not be permanently lost. The regular backup is needed because the user doesn’t know what will happen to computer and the data may be loss.