Beruflich Dokumente
Kultur Dokumente
Disasters that can cause hardware, software and data loss such as fire are
inevitable. One can minimize the losses by formulating a plan to recover from such
disasters and to keep the business operational. A disaster recovery plan is a method
of restoring computer processing operations and data files if operations are halted
or files are damaged by major destruction.
There are various approaches that a company can adapt in their disaster
recovery plan. These are: reverting to manual services, buying time at a service
bureau, mutual aid pact or forming consortiums. Reverting to manual services is not
recommended for businesses operating in a large scale such as banks and financial
institutions because of its slow processing ability. Companies can buy time at a
service bureau which is a company that provide services for a fee. A mutual aid
pack is an agreement between two or more companies to lend each other
computing power if one of them has a problem. A consortium is a joint venture to
support a complete computing facility. There are two kinds of facilities; hot site and
a cold site. A hot site is a fully equipped computer center with hardware,
environmental controls, security, and communications facilities while a cold site is
an environmentally suitable empty shell in which a company can install its own
computer system. All of these approaches have their own positive and negative
traits which a company can use in their own discretion.
Fully equipped
Hot site Fast processing Most expensive to operate
ability
Consortium Immediate action
Cold Site Less expensive than It takes longer to get the enterprise
hot site in full operation after the disaster
Software Security
Who owns custom-made software?
Employee
Owner
Programmer
= Organization
Programmer
of the
Consultant
Organization
Data Security
• Secured Wastes
Discarded printouts, printer ribbons and the like can be sources of
information to unauthorized people. This can be avoided by using a
paper shredder and locked trash barrels.
• Auditor Checks
Auditors go over the financial books of the company and during the
course of their duties, they frequently review computer programs and
data. Through this, they can check some errors or alterations on the
data. They can also see who accessed these data when it is not usually
used to look for suspicious actions.
• Applicant Screening
Theft of data can be easily done by a person that can go within the
business’ premises easily. That’s why employers should do background
checks in their employees to help weed out dishonest applicants
reducing the risk of information leakage.
• Passwords
A password is a secret word, number or a combination of the two that
must be typed on the keyboard to gain access to a computer system.
Employees should be taught to formulate passwords that are hard to
break by a password breaking program. This can be done by combining
letters, numbers and symbols creating a non-existent word in any
language.
Personal computers have high money equivalent in the market that’s why it is
likely to be stolen by thieves. One can avoid this by securing personal computers in
place with locks and cables. Also, most personal computers have an individual cover
lock that prevents access to internal components. One should also avoid eating,
drinking, and smoking while using computers. Occasional cleaning is also
recommended.
There are many ways to back up files. Some people make another copy of
their hard disk files in diskette while others back up their files on tape. You can also
use a mirror hard disk, which is a second copy of everything you put on the original
disk, but can cost a lot of money. Back up softwares that can automatically back up
files at a certain time of day or on command are also available. Generally, backup
softwares provides three types of back ups. A full backup copies everything from the
hard drive. A differential back up copies all files that have been changed since the
last full backup. An incremental backup copies only those files that have been
changed since either the last full backup or the last incremental backup. A
comprehensive backup plan involves periodic backups, complemented by either
incremental or differential backups. These backup plans also differ in their
restoration process.
Restoration Process:
Most recent
Last
differential
Differential
Full Backup
backup
Approach
A.)
Incremental
Incremental
Last
Incremental
Backup
Backup
Full Backup
Approach
B.)