Residency - Zombies Attached Files: Zombie_GN_Final.pdf (11.817 MB) DRPlanTemplate.docx (20.403 KB)Your teams is a group of security analysts for a federal agency that houses important historical and
ITS 835 Disaster Recovery Plan
Section 1. Major goals of this planThe major goals of this plan are the following:
To minimize interruptions to the normal operations.
To limit the extent of disruption and damage.
To minimize the economic impact of the interruption.
To establish alternative means of operation in advance.
To train personnel with emergency procedures.
To provide for smooth and rapid restoration of service.
Data processing personnel Enter your names and other information | |||
Name | Position | Student ID | Team Number |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
List any major applications here | ||||
Application Name | Critical (H/M/L) | Fixed Asset? Yes/No | Manufacturer | Comments |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
List major servers here
Device Name | Critical (H/M/L) | Model | Manufacturer | Comments | ||
|
|
|
|
| ||
|
|
|
|
| ||
|
|
|
|
| ||
|
|
|
|
| ||
|
|
|
|
| ||
|
|
|
|
| ||
|
|
|
|
| ||
Miscellaneous inventory List anything not in the above that is part of this system | ||||||
Description | Quantity | Comments | ||||
|
|
| ||||
|
|
| ||||
|
|
| ||||
|
|
| ||||
|
|
| ||||
Describe the backup procedures here for all servers listed above
Server Name | Backup Procedure | Audit Frequency |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
For any disaster recovery plan, the following three elements should be addressed.
Emergency Response Procedures
To document the appropriate emergency response to a fire, natural disaster, or any other activity in order to protect lives and limit damage.
Backup Operations Procedures
To ensure that essential data processing operational tasks can be conducted after the disruption.
Recovery Actions Procedures
To facilitate the rapid restoration of a data processing system following a disaster.
Disaster action checklistModify as needed
Plan Initiation
Notify senior management
Contact and set up disaster recovery team
Determine degree of disaster
Implement proper application recovery plan dependent on extent of disaster (see Section 7. Recovery plan--mobile site)
Monitor progress
Contact backup site and establish schedules
Contact all other necessary personnel--both user and data processing
Contact vendors--both hardware and software
Notify users of the disruption of service
Follow-Up Checklist
List teams and tasks of each
Obtain emergency cash and set up transportation to and from backup site, if necessary
Set up living quarters, if necessary
Set up eating establishments, as required
List all personnel and their telephone numbers
Establish user participation plan
Set up the delivery and the receipt of mail
Establish emergency office supplies
Rent or purchase equipment, as needed
Determine applications to be run and in what sequence
Identify number of workstations needed
Check out any off-line equipment needs for each application
Check on forms needed for each application
Check all data being taken to backup site before leaving and leave inventory profile at home location
Set up primary vendors for assistance with problems incurred during emergency
Plan for transportation of any additional items needed at backup site
Take directions (map) to backup site
Check for additional magnetic tapes, if required
Take copies of system and operational documentation and procedural manuals.
Ensure that all personnel involved know their tasks
Notify insurance companies
Describe the mobile site setup plan here.
Communication disaster plan
Describe the communication disaster plan, (how do you plan to keep communications within your group and authorities, in case primary means are not available, such as telcos and mobile networks)
Electrical service
Describe the electrical services here. (Describe primary and backup)
Section 8. Protecting Primary Site
How do you plan to protect your assets from physical and digital threats?
In successful contingency planning, it is important to test and evaluate the plan regularly. Describe how you would test your plan.