Thursday, June 20, 2019

Business continuity, backup and disaster recovery plan Research Paper

Business continuity, substitute and disaster recovery stick out - Research Paper ExampleThe purpose of this research paper is to define what this plan is, analyze its components and effectively see its overall success and limitations. Business Continuity is a planning process that provides a framework to ensure survival of a business at any presenting risk. It insures the future of the business with respect to key customers, business reputation and suppliers. (Bell. J., June 2000). The components of the business continuity life cycle include summary, ancestor design, Implementation, Testing & acceptance and Maintenance. Business continuity plans need to be clear and concise. They should clarify all the protocol and procedures to be followed in the event of a disaster. It should be part and parcel of any business. (Harney, J., 2004). We will consider the above five steps in coming up with an effective business continuity plan. Analysis Here, we formulate a list of potential vulner abilities within the business. That is, whether risk pose within the resource segment, or systems, processes, or suppliers. Therefore, it implies a consideration of each department separately. We analyze the overall performance of each department with regards to its input in the business. ... Business-driven risks include application outages, or surplus from marketing demand-generation campaigns. They may cause business-wide ramifications that guide in breaches in compliance, governance, availability, security and performance. (IBM Global, June 2011). If left unattended, they may cause concern to the top management and stakeholders. Data-driven risks focus on a wide range of factors such as disk failure, corruption, viruses or exponential data growth. This impacts negatively on the business. Event-driven risks disrupt the companys personnel, processes, applications and infrastructure. They present as power outages, natural disasters, pandemics, fires, and thefts. (IBM Global, Jun e 2011) resolvent design Once we have identified potential risks after a rigorous analytical method. Then we strategize on the resultant role design process. (Dimattia, S., November 15, 2000). We customize the solution to the risks. A robust resilience solution for business-driven risks goes beyond simply restoring the business IT infrastructure, to keeping the business continuously operating and easing management of compliance with pains regulations. It calls for the provision of virtually anytime, anywhere accessibility to approved users. To protect against data-driven risks, the business solution will focus on a delivery of an efficient backup and quick retrieval of critical data and information. It requires an indexing method with efficient search capabilities. The data also needs to be managed continuously and kept fail-safe from viruses, thefts and other forms of loss. To mitigate the Event-driven risks, the business must be able to distribute operations beyond the area of immediate impact. (IBM Global, June 2011). This implies business

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.