Disaster Recovery Plan for IT/Email Systems: Analysis and Strategies
VerifiedAdded on 2021/01/02
|6
|897
|396
Report
AI Summary
This report presents a Disaster Recovery Plan for IT/Email systems, addressing various threats such as viruses, worms, and Trojans that can impact data security. It outlines backup strategies using tools like Cobian Backup and Paragon Backup & Recovery, emphasizing the importance of data management and compliance with legislative and regulatory constraints. The report explains the rationale behind backup schedules and strategies, highlighting the need for addressing human errors, hardware failures, and unpredictable events. It also discusses risk mitigation strategies, including failover techniques, system redundancy, and software testing, referencing relevant literature to support the analysis. The plan aims to provide a comprehensive approach to data protection and recovery in the event of a disaster, ensuring business continuity and data integrity.

Disaster Recovery Plan – IT/Email
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
TASKS.............................................................................................................................................3
List the threats that could impact any of the important data listed above?.................................3
Describe the applications and files that you will backup?..........................................................3
Which, if any, data listed as important may be subject to legislative or regulatory constraints?
.....................................................................................................................................................4
Explain the key reason behind the backup strategy and schedule..............................................4
List any risk mitigation strategies for user documents, failover techniques and system
redundancy that could be employed............................................................................................4
REFERENCES................................................................................................................................5
TASKS.............................................................................................................................................3
List the threats that could impact any of the important data listed above?.................................3
Describe the applications and files that you will backup?..........................................................3
Which, if any, data listed as important may be subject to legislative or regulatory constraints?
.....................................................................................................................................................4
Explain the key reason behind the backup strategy and schedule..............................................4
List any risk mitigation strategies for user documents, failover techniques and system
redundancy that could be employed............................................................................................4
REFERENCES................................................................................................................................5

TASKS
List the threats that could impact any of the important data listed above?
There are large number of system security threats that impact on the entire data of IT
organization. IT professional faced many challenges for securing the environment. The security
threats are the malicious event and action that targeted in the personal information of
organizations. There are different types of threat discuss as followings: Virus- This is basically the computer programs that affect the functionality and operation
of hardware system. For Example- Medical virus, It has ability to infect the entire data
processing of computer system (Distefano and et.al., 2015). These viruses can be
transmitted from one device to another by using the portable media, USB drivers and
other network etc. Worm- It is a type of virus that effect the data of hardware system and it can be replicate
many times and consumer the memory and space of hard disk. In this way, the computer
will process in slower and crashes all files.
Trojan- This is also computer programs that allow for hackers to easily access all the
information of personal computers. It will infect the hardware that used in the data
storage and processing.
Describe the applications and files that you will backup?
A data backup is a process that help for archiving and copying the entire folder or files for the
purpose to restore all information in proper manner (Thomas, Singal and Kushwaha, 2018). Data
loss can be caused by many things whereas the computer viruses affect to corrupt the file. There
are followings application used for back up the files.
Cobian Backup- It is high software that help for customized the data and protected in
effective manner. It is beneficial for schedule and create different backup jobs and file
into another hardware system.
Paragon backup and Recovery- it is easier process to back up the entire system in
proper manner. It is based on the data management tool that includes USB and CD
system that help for recovery the information in effective ways.
List the threats that could impact any of the important data listed above?
There are large number of system security threats that impact on the entire data of IT
organization. IT professional faced many challenges for securing the environment. The security
threats are the malicious event and action that targeted in the personal information of
organizations. There are different types of threat discuss as followings: Virus- This is basically the computer programs that affect the functionality and operation
of hardware system. For Example- Medical virus, It has ability to infect the entire data
processing of computer system (Distefano and et.al., 2015). These viruses can be
transmitted from one device to another by using the portable media, USB drivers and
other network etc. Worm- It is a type of virus that effect the data of hardware system and it can be replicate
many times and consumer the memory and space of hard disk. In this way, the computer
will process in slower and crashes all files.
Trojan- This is also computer programs that allow for hackers to easily access all the
information of personal computers. It will infect the hardware that used in the data
storage and processing.
Describe the applications and files that you will backup?
A data backup is a process that help for archiving and copying the entire folder or files for the
purpose to restore all information in proper manner (Thomas, Singal and Kushwaha, 2018). Data
loss can be caused by many things whereas the computer viruses affect to corrupt the file. There
are followings application used for back up the files.
Cobian Backup- It is high software that help for customized the data and protected in
effective manner. It is beneficial for schedule and create different backup jobs and file
into another hardware system.
Paragon backup and Recovery- it is easier process to back up the entire system in
proper manner. It is based on the data management tool that includes USB and CD
system that help for recovery the information in effective ways.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Which, if any, data listed as important may be subject to legislative or regulatory constraints?
Data management is important part of organization that help for providing the
information to the client and consumers. Skillage I.T. is mainly used the data protection laws,
procedures and policies which important goals to minimize the intrusion the process (Willcocks
and Lacity, 2018). It also provides the privacy and security in the personal information of
company and customers. According to government, This rule passed in the organization to
follow all the practices and procedures regarding the safety and security of data.
Explain the key reason behind the backup strategy and schedule.
Backup strategies and schedule are important concept for data protection in the firm
because it helps for identifying the particular virus that affect the entire data processing for
system and afterwards, it will create a schedule to implement the action plan against the threats
in the system. In this way, it is easily removed and detect all the threats or malware that affect
the entire processing of the system(Thomas, Singal and Kushwaha, 2018). It also useful for
choose the right steps to manage the schedule to identify the copied file or folders. There are
important reason behind for planning the strategies and schedules.
Human makes mistakes
Machines and hardware failure
Unpredictable nature
List any risk mitigation strategies for user documents, failover techniques and system
redundancy that could be employed.
There are different type of risk mitigation strategies that applicable in the different
criteria and management.
Take correct action plans that implement in the actual event occurs.
Failover strategies
Virtualisation HA
Inter systems and IRIS Mirroring
Software testing
Backup strategies and schedule
Data management is important part of organization that help for providing the
information to the client and consumers. Skillage I.T. is mainly used the data protection laws,
procedures and policies which important goals to minimize the intrusion the process (Willcocks
and Lacity, 2018). It also provides the privacy and security in the personal information of
company and customers. According to government, This rule passed in the organization to
follow all the practices and procedures regarding the safety and security of data.
Explain the key reason behind the backup strategy and schedule.
Backup strategies and schedule are important concept for data protection in the firm
because it helps for identifying the particular virus that affect the entire data processing for
system and afterwards, it will create a schedule to implement the action plan against the threats
in the system. In this way, it is easily removed and detect all the threats or malware that affect
the entire processing of the system(Thomas, Singal and Kushwaha, 2018). It also useful for
choose the right steps to manage the schedule to identify the copied file or folders. There are
important reason behind for planning the strategies and schedules.
Human makes mistakes
Machines and hardware failure
Unpredictable nature
List any risk mitigation strategies for user documents, failover techniques and system
redundancy that could be employed.
There are different type of risk mitigation strategies that applicable in the different
criteria and management.
Take correct action plans that implement in the actual event occurs.
Failover strategies
Virtualisation HA
Inter systems and IRIS Mirroring
Software testing
Backup strategies and schedule
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Books and journals:
Distefano, A. and et.al., 2015, September. SecureRTU: security on RTU configuration
management by Digital Signatures. In Smart Electric Distribution Systems and
Technologies (EDST), 2015 International Symposium on (pp. 356-361). IEEE.
Thomas, A., Singal, G. and Kushwaha, R., 2018. Smart Vehicles for Traffic Management and
Systems Using Cloud Computing. In Vehicular Cloud Computing for Traffic Management
and Systems (pp. 178-199). IGI Global.
Willcocks, L.P. and Lacity, M., 2018. Cloud Computing as Innovation: Cases and Practices.
In Dynamic Innovation in Outsourcing (pp. 197-237). Palgrave Macmillan, Cham.
Books and journals:
Distefano, A. and et.al., 2015, September. SecureRTU: security on RTU configuration
management by Digital Signatures. In Smart Electric Distribution Systems and
Technologies (EDST), 2015 International Symposium on (pp. 356-361). IEEE.
Thomas, A., Singal, G. and Kushwaha, R., 2018. Smart Vehicles for Traffic Management and
Systems Using Cloud Computing. In Vehicular Cloud Computing for Traffic Management
and Systems (pp. 178-199). IGI Global.
Willcocks, L.P. and Lacity, M., 2018. Cloud Computing as Innovation: Cases and Practices.
In Dynamic Innovation in Outsourcing (pp. 197-237). Palgrave Macmillan, Cham.

⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.