Disaster Recovery Plan Decision Maker It is important to establish a decision maker before starting your disaster recovery plan. This person will be responsible for the disaster recovery operation. For SIHE the responsible person will be the institution's security officer (contact Mr Hue Williams: 01792 455695). It will ensure that all disaster plan actions are taken forward when necessary. Another manager will also be designated: this person will be the security manager located on the Townhill campus. If for any reason the first safety officer is not available, this person will take his place. (Contact Mr Greg Adams: 01792 477895 ext 665) Staff Duties and Responsibilities Backup: Staff must regularly back up their work and save it on disks and computers. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Comply with security policy: All personnel must be given a security policy and must comply with the company information security policy and no other available software must be used on the network. New location: If necessary, all staff must be prepared to work at another location in the event that a disaster occurs that does not allow them to work at their current location. Training: Staff must undergo training so that they can be prepared and be able to cope. Network Manager: This person will ensure that the universities network is up and running in case of problems. You should be contacted when this happens. He should know all the procedures and backup plans when a problem occurs and where to know where all the extra equipment is stored if a problem were to occur. A second network manager or backup manager must also be appointed in case the network manager is unavailable. Contact Information Name Position Responsibilities Contact Hue Williams 1st DMM Recovery Planning 01792 455695 Greg Adams 2nd DMM Recovery Planning 01792 477895 ext 665 Jon Davis Network Manager Network Recovery 01792 468356 ext 8864 David Gray General Software and Hardware Recovery Technician01792 665748 Robert ThomasSecurity OfficerAccess to Backup01792 558657 ext 445 In a major disaster, all of the above individuals should be contacted to ensure full disaster recovery.Threats The threats Swansea Institute may encounter are physical, accidental and intentional natural disasters.Deliberate Threats: Hardware sabotage Hardware theft Software piracy Copied or stolen data Fire Virus Accidental threats Data loss Accidental deletion of data Circuit failure Network failure Computer failure Natural disasters Fire Floods Weather damage, such as storms Energy loss List of priorities The Swansea Institute has four human departments located on the network are:- Student Area Academic Area Finance Area Register Area Networks Area this includes 1 Access Server 1 Web Server 1 Email Server 1 DNS Server 1 DHCP Server 1 Library Server Now I will tidy up by saying what has the maximum priority in the network, i.e. what should be solved first. I have color coded in order of importance: Red = Hazard needs to be addressed immediately Orange = Risk needs to be addressed as soon as possible Blue = No immediate risk but should be addressed when possible [1] Finance Area (red code): This issue should be resolved immediately and the network server managershould be contacted when errors occur and the full backup procedure should be used. Networks area (code orange): This issue should be resolved as soon as possible. Registry Area (orange code): This issue should be resolved as soon as possible. Student Area (code blue) - Although coded blue as there is no immediate risk, this should also be addressed as soon as possible as it contains student work, which they may need to access quickly. Academic Area (Code Blue) - This should also be sorted out as soon as possible even if it has only been assigned a Code Blue as this may contain teacher's notes for lectures and exam papers. The network (code red) - If the network goes down, the problem must be resolved immediately and the network manager must also be contacted as soon as the problem occurs, if he is not available, the second network manager must be appointed. Where the backup must be stored Data and hardware Several copies of the data backup must be stored in different locations: - 1 copy of the data to be stored in the Mount Pleasant building 1 copy of the data to be stored in the Townhill campus 2 copies of data should be stored outside the building in Mount Pleasant Many people should know the location of this data so that it can be easily retrieved when needed. The same goes for hardware and software. All backups are stored in 3 different types of backup media, so that if one becomes damaged, you can use another version. Networks, Circuits, Backbones, Cables Extra equipment such as circuits, repeaters, backbones, extra cables and bridges should be maintained within the Mount Pleasant building as well as some outside the building and on the grounds of the Townhill campus. The network manager must know the exact location where they are stored and it must be stored in a place that is easy to retrieve. Procedures to Ensure Adequate Testing of the Recovery Plan Testing of backup procedures should be performed regularly. This can happen any time the institution conducts a fire drill. During the test you should perform any procedures that might occur in a real disaster, such as verifying that the power generator works efficiently in the event of a power outage. All software and data backups should also be checked so that in the event of data loss, it is easy to recover. Always check that you can read from the media you backed up. Also, if the data is encrypted, make sure more than one person knows how to decrypt it. Create multiple backups so you have redundancy in your backup system. Additionally, if for any reason one of your backup media is damaged or lost, there are still other backup media available. You also need to maintain additional backup outside of the nice building, such as on the Townhill campus. Special care should be taken to ensure that backup media is not stored in a location subject to damage such as heat, water, and wind. It is also important not to forget to check automatic backups: you need to verify their correct functioning by carrying out routine checks regularly. Once you have taken a tested backup, you need to write a report on how the backup was recovered, whether there were any problems and ways to improve it. the backup procedure. Backup Strategy The file server should contain two disk drives, mirrored disks containing identical data. All data is saved on both disks at the same time, so if one disk crashes, the other disk drive contains all the data. A daily backup of all datait is recorded on tape and stored in the safe. On a weekly basis, a tape containing a copy of all data is stored in an offsite location. The system administrator should review the system logs daily to ensure that the backup process was performed correctly. The recovery process is periodically tested to ensure that recovery procedures are operational and valid. A copy of all original system programs is stored in the computer library and an additional copy is stored off-site. A backup copy of system programs is created monthly to ensure that all relevant software patches are included in recovery processes. This monthly backup copy is also tested periodically to ensure that the recovery process is valid. Daily backups should be retained for one week Weekly backups should be retained for one month Retain all monthly backups for one year All backup media should be carefully labeled which includes what was backed up and when. If the saved data is only changes, you should perform incremental backups in order to save storage space, however this should only be done after performing a full backup. Standby Sites A standby site will be assigned if for any reason the backup cannot be performed. data recovery in Mount Pleasant, the standby site will be on the Townhill campus, and another standby site is expected to be available outside the Institute's main building in Swansea. These standby sites should contain all facilities to proceed with a backup such as computers, necessary power and cables, etc. If possible, an agreement should be made with another site in the event that a recovery plan cannot take place at either the Townhill campus or the Mount Pleasant campus in this case it should take place at Swansea University in Wales. Storing data and software Various types of media must be used to store data and software. Backup to tape. Here you can store small amounts of data that don't need to be updated or changed, as well as data that needs to be backed up. This is also inexpensive. However, tape backups take a long time, so it's not a good idea to use them when you need to quickly back up a lot of data. Recordable CDs. This type of media is useful when keeping copies of software as they are capable of holding large amounts of data as they can hold up to 640 and 800 megabytes (MB) of data. You should not need to back up your software, as long as you have the original backup, unless the software has been modified or updated. Floppy disks. These can also be used when you don't need to store a lot of data. You can use a simple method of write-protecting disks to ensure that data is not overwritten accidentally or intentionally. Automatic backups. Backup Exec is preferred because it can be made fully automatic and is one of the most popular products in the industry. You can purchase it from the website www.dabs.com. What to do in case of: Power failure In the event of a power failure, the backup generator must be turned on and is located between server 8654A and 64368B in room 312 (level 3). Another backup generator is also found in the FADE building in the security office, which is room H6A7 (level 1). The person responsible for both backup generators is Hue Williams. If the main building is inaccessible If the main building is inaccessible for any reason, for example the building is damaged and it is dangerous to enter. So.
tags