In this regard all the secondary sources were accessed and the related material is sorted out for the review. The second important activity was to present the case study of a company and to gather sufficient information about disaster recovery in the company; it was found that there must be a detailed discussion with some person who can provide required authentic information with full responsibility. Thus the objectives of the research are clearly understood to find the appropriate activity for their achievement.
After setting up the activity for the dissertation, there were some plans made for the successful accomplishment of the activities. In this regard the sources for collecting information were listed out and then a time table was set up to determine that when and how much information will be collected from these sources. In this period the time frame was decided so that all the activities can be conducted within the available time. Another important task was to select the company for the case study and arrange an interview with the some of the personnel working there. Different business cases were studied from the business journals and magazines and then the company was selected keeping in view that the personnel of the company will be approached or not. Personal, academic as well as professional contacts and references were used to arrange the interview with important personnel of the company to gather the required information.
After conducting both of the activities i.e. review of the literature and in depth interview, the main task was to arrange and organize the information gather from both of these sources. In this regard the time frame set earlier was followed and the material collected from the literature review is sorted out according to the topics to be covered in the literature review so that the dissertation can present the literature review in an organized and easy understood able manner. The interview of the personnel was conducted face to face and it was recorded after getting the permission from the personnel. Thus in this step the recorded interview was transcribed and then the information was sorted out according to the requirement of the research.
Main Concerns and Worries
The topic of the dissertation has also been recognized by the researchers and social scientist as an important issue for the business so there was lot of literature present at different resources around the topic that cover the topic from different aspects. In this situation it was one of the major concerns to select and review the material that is not only relevant but also useful for the dissertation. Having too much choices in front often creates confusions and a big worry was to overcome this confusion that what to take for the review and what not. In the same way the selection of the company for the case study was also not a simple decision because there are many company that have faced disasters at some time and they have also make their plans for the recovery. Some of them were successful in restoring their losses and some of them were failed so it was a difficult decision to select the company.
Moreover it was decided to conduct an
The main objective of the dissertation was to study the importance of business disaster recovery for the businesses and finding some practical evidences from the business world to get a deep insight over the issue and to understand that how the companies can effectively manage their disaster recovery process through strategic planning and precautionary measures…
Plan Implementation, Testing 5 II. Objectives and Scope of the Disaster Recovery Plan 5 III. Staffing, Organization for the Disaster Recovery Plan 6 IV. Control of the Project 6 V. Deliverables and Schedules 7 References 8 I. Description of the Program/Disaster Recovery Plan A.
Some of the disasters occur because of human error while others occur due to unpreventable natural catastrophes. Disasters due to human faults caused by inadvertently ignited fires, environmental pollution and outbreak of diseases due to negligence and poor hygiene are often devastating but avoidable.
However, over the few years, the situation has changed. Management of corporations are taking this matter at a corporate level. The line managers of various departments now realize that they can never be sure about safety from disasters. Therefore organizations such as NIST have outlined several disaster recovery best practices in order to help companies implement a contingency plan.
It therefore is important to have a disaster recovery plan in place to quickly and effectively deal with damage that occurs and to mitigate as much as possible.
First it is necessary to describe the nature of my
Microsoft COTS are the Microsoft line of Server products, including Microsoft Exchange, Microsoft SQL, and Microsoft SharePoint, among others (Bahan, 2003; CXO Media/ IDG Enterprise, 2012; US Small Business Administration,
Disruptions to the company’s IT system can lead to fear, distrust, and even chaos. This means vital digital records and documents will get lost. A loss in accountability and productivity will also take place in the company. These will also lead to a loss
This write up focuses on the processes used by organizations to help them in the preparation of disruptive events such as business continuity and disaster recovery planning models. Disaster recovery models are the processes by which a business is resumed after a catastrophe while business continuity models are comprehensive approaches, which make sure that an organization will continue earning money.
A disaster causes a disruption in any business enterprise for either the entire business or part of its productions. Either way, it causes loses in revenue to the firm. Every business subsystem as well as operations should have an efficient
Physical controls must be embedded to ensure that facilities do not get violated and data centers are secured. This would allow the data centers to be securely equipped. The ISACA makes it very clear for
For full protection to be achieved, certain measures have to be put in place, like safety evaluation, penetration testing, risk assessment, authorization, and vulnerability administration. Computer Security is applied to
2 pages (500 words)Essay
Get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Apply my DISCOUNT
Got a tricky question? Receive an answer from students like you!Try us!
Didn't find an essay?
Contact us via Live Chat, call us at +16312120006or send an email to firstname.lastname@example.org