logo

Network Security and Disaster Recovery Plan

   

Added on  2023-06-15

8 Pages1971 Words398 Views
Running head: NETWORK SECURITY
Network security
Name of the student
Name of the University
Author note
Network Security and Disaster Recovery Plan_1
1NETWORK SECURITY
Answer to question 1
Steps followed after IT disaster occurence
After the occurrence of an IT disaster in a company or organization, there are five steps
that should be adopted. These steps must be present in any company or organization so that an
effective disaster recovery process is adopted. The first step is the development of a Disaster
Recovery contingency statement for the management of disasters in the company or organization
(Wallace & Webber, 2017). The second step involves the conduction of a business impact
analysis which will help in denoting the impact of the disaster of the business. The third step
involves the identification of controls and measures that are utilized for the mitigation of any
future disasters. The fourth step involves the development of recovery strategies that will be
utilized in case any disaster strikes again. The fifth step involves the implementation and testing
of the mitigation plan.
Data security
In a similar manner, data security is involved in the application of disaster recovery plans.
In case of any occurrence of disasters in the company, the need to secure the data is a necessity
which in turn will lead to re-instatement of the business (Chang, 2015). For this reason, security
of the data is adopted every time in a disaster recovery and disaster mitigation plan.
Answer to question 2
Technologies suited for disaster recovery
Network Security and Disaster Recovery Plan_2
2NETWORK SECURITY
There are various technologies that can be best used for disaster recovery processes.
These processes are effectively utilized in various companies or organizations by which disaster
recovery is adopted. The first technology is the adoption of server virtualization which removes
the existence of any physical server. This in turn leads to effective mitigation of disasters.
Secondly, the use of cloud disaster recovery technology is another such method which can be
used to address disaster recovery efficiently. The cloud technology can be used to effectively
recover the system from their backups which removes the downtime faced after the occurrence
of any disasters. Thirdly, data replication can also be used for saving the data so that it can be
downloaded when required. In cases like this, the data can be stored in online or offline storages.
Fourthly, the use of email support is another technology which can help in disaster recovery
(Phillips, 2015). As business prospects are always stored and showed using emails, the processes
can be effectively recovered by recovering the emails. Lastly, the use of bring your own devices
in the workplace can also help in storing the data in each of the devices which can then be
recovered after disaster strike.
Steps followed for business continuity
There are various steps which are undertaken after the disruption of business services.
These steps help in effective continuity of processes so that the normal processing is utilized.
The first step is the identification of risk impacts. This will help in developing the flow in
operations. The next step is the conduction of risk assessment processes which will help in
determining the loss of data and other resources (Authority, 2014). The third step is the
conduction of business impact analysis which helps in determining the impact on business due to
the disruption. The fourth step involves the development of a plan which will be used for
adoption in business process such that any further risks can be mitigated. The fifth step is the
Network Security and Disaster Recovery Plan_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of Risk Mitigation and Planning Tools
|3
|830
|42

Disaster Recovery Poster Assignment 2022
|1
|978
|43

What Is Business Continuity and Why Is It Important?
|10
|1590
|14

Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address
|16
|4641
|349

Autonomous, Seamless and Resilience Carrier Cloud Brokerage Solution for Business Contingencies during Disaster Recovery
|8
|5545
|310

ATA Backup Disaster Recovery Data
|7
|1179
|143