University: Disaster Recovery and Business Continuity Plan Report

Verified

Added on  2020/04/15

|5
|826
|244
Report
AI Summary
This report delves into the critical aspects of Disaster Recovery (DR) and Business Continuity (BC) plans, emphasizing the importance of data confidentiality and security. It explores the inherent tension between ensuring the availability of disaster plans and protecting sensitive business information. The report discusses potential threats to confidentiality, such as malicious activities, accidental damage, and employee actions, and proposes strategies to mitigate these risks. These strategies include implementing employment contracts with confidentiality clauses, which legally bind employees to protect company information, and employing secure authentication methods, such as color pass interfaces, to reduce the likelihood of data theft. The report underscores the necessity of developing data backups to ensure business continuity in the event of data loss or damage, ultimately offering practical recommendations for safeguarding confidential information and maintaining robust disaster recovery and business continuity strategies.
Document Page
Running head: DISASTER RECOVERY
Business Continuity Plan and Disaster Recovery Plan
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2DISASTER RECOVERY
Table of Contents
Introduction......................................................................................................................................3
Discussion of the issues regarding availability versus confidentiality of Disaster recovery (Dr)
and Business Continuity (BC) plan.................................................................................................3
Conclusion.......................................................................................................................................4
References........................................................................................................................................5
Document Page
3DISASTER RECOVERY
Introduction
Important documents of the disaster recovery and business continuity plan should be
protected. However, confidentiality of the vital information regarding the plan needs to be
maintained. However, if the authority fails to keep the confidentiality of the business plan then
the business may lead towards the loss (Fernandez & Alexander, 2016). Employee information
and blueprint of any plan should be confidential.
Discussion of the issues regarding availability versus confidentiality of Disaster recovery
(DR) and Business Continuity (BC) plan
Disaster recovery team needs to ensure the availability of the disaster plan to maintain the
business continuity. They need to keep several copies of the proposed plan in their office, home,
and vehicle. This will help them to take action during the emergency. However, it is important
for the DR team to maintain the confidentiality of the documents and the business information
along with keeping the availability of the disaster plan (Brown, 2017). One of the major factors
that damage the confidentiality of the information is the malicious activities. Hence, it is crucial
for the malware author to adopt the technique to encapsulation of the malicious documents and
analyze the system software. On the other hand, confidentiality of the information can break due
to accidental damage, theft of the data and employee resignation.
The organization needs to make an employment contract regarding confidentiality
clauses. This will enable the employees to make a legal contract with the organization to keep
the confidentiality of the company information (Baldi et al., 2016). As a result, the chances of the
breach of confidentiality can be reduced if the employee turnover occurs in an organization. In
Document Page
4DISASTER RECOVERY
this case, the employees are not able to disclose the company information to other competitors as
they may face a legal issue. Hence, the employees will be liable to hand over the documents of
disaster recovery plan to the business authority. On the other hand, classical pin entry mechanism
will be helpful for the business organization to reduce the data theft. This pin entry is used
widely for authenticating a user. This entry method will enable the technician to record all
activities of the login process that is used by the hacker. In this PIN entry method, an intelligent
user interface is applied known as color pass interface (Patel, Shah & Godhani, 2016). This
reduces the probability of malicious attack as well as resists the hacker. Hence, data cannot be
theft. On the other hand, for the DR team, it is important to develop a back up of all necessary
information regarding the disaster plan. As a result, if the data is damaged due to an accident
then this will be recovered. Such methods will be effective to maintain the confidentiality of the
information and keep the continuity of the business without any fear of data damage.
Conclusion
The above study deals with the factors associated with the data damage and solution to
reduce the breach of confidentiality. Hence, it is important to make a contract with the
employees, which allows them to secure the information of the data that are present in their
home or office. Therefore, use of color pass is also a unique method to minimize the data theft a
malicious attack.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5DISASTER RECOVERY
References
Baldi, M., Cucchiarelli, A., Senigagliesi, L., Spalazzi, L., & Spegni, F. (2016, July). Parametric
and probabilistic model checking of confidentiality in data dispersal algorithms. In High
Performance Computing & Simulation (HPCS), 2016 International Conference on (pp.
476-483). IEEE.
Brown, H. (2017). Privacy law and cyber security: Is your practice secure?: Client confidentiality
and data breach. LSJ: Law Society of NSW Journal, (39), 88.
Fernandez, A., & Alexander, K. M. (2016). Data Privacy and Confidentiality. iURBAN:
Intelligent Urban Energy Tool, 35.
Patel, B., Shah, K., & Godhani, K. (2016). SECURE AUTHENTICATION FOR BUSINESS
MANAGEMENT SYSTEM USING COLOR PASS. International Education and
Research Journal, 2(5).
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]