Information Technology (IT) Security Plan for Car Motor CompanyA-Level Coursework

Pages: 16 (4621 words)  |  Style: n/a  |  Sources: 0

Custom Writing

¶ … it infrastructure to the day-to-day running of business operations cannot be overemphasized. Various critical business processes are controlled by the various computer systems that are tailored to meet the demands of these unique processes. However, a disruption to the it infrastructure can bring all the critical company's operations to a sudden halt. The repercussions can run into the loss of very large amount of money. This paper describes a systematic plan that is aimed at restoring the it infrastructure of Jubilee Motor Company (JMC).The company just suffered a major breakdown of its it infrastructures as a result of an accidental fire outbreak. The paper described an emergency system implementation and a detailed it Disaster Recovery plan which must comply with the existing laws. Apart from the plan, the paper also outlines the user policies to act as a guideline for the professional use of the it infrastructure.

Introduction

The importance of it Disaster Recovery plan can be seen from previous cases of disasters that paralysed the normal operations of various nations and organizations. A perfect example can be drawn from the September 11th, 2002 terrorist attack on the U.S. soil. A disaster recovery plan can also be referred to as a Business Continuity Plan (BCP) and provides a description of all the steps that must be followed by an organization in ensuring that various specific processes continue to run in the event of any disaster, man-made or otherwise.

The formulation of an it Disaster Recovery plan involves a thorough evaluation of the basic and mission critical components of an it supported and run system. It is important to come up with a BPC that ensures that the operations of a given firm continue to flourish and are available whenever they are required. It is important to come up with an effective it Data recovery plan that would ensure that events are quickly contained to avert the possible losses in revenue and company image as a result of an unprecedented system failures and breakdown.

Part one: Disaster

Overview of Data recovery timeline

During the 1960s and 1980s the users of various it systems began to realize the various Single Point of Failures (SPOF) that existed in the various systems. Corporations and individuals recognized the fact that the impact of disruption of the it infrastructure resulted in significant impact upon the business continuity operations of various organizational key operations. It was important to maintain the continuity of the business process and no amount of threat to the system was tolerable.Therefore various it infrastructure components such as the hardware, the it network infrastructure and other elements of the it system had to be designed in better manners so as to eliminate the various SPOFs. The financial implications of data loss and disruption of various mission critical components of an organization were huge. Therefore Engineers came up with better systems that had little SPOFs.It therefore became necessary to develop various forms of data recovery plans in order to ensure that the various computer systems and the data contained within them were maintained and restored to a state of normalcy prior to various incidents that could have caused a disruption.

The relationship between it Disaster Recovery plan and business continuity

The it Disaster Recovery plan to be drafted for the JMC is meant to address specific business processes. Its relationship with the various business processes cannot be overemphasized. The manufacturing processes must continue to take place in the JMC manufacturing centres. This means that all mission critical parts of the company must be maintained in perfect working condition. The relationship between the Disaster Recovery Plan and the BCP is therefore profound. In actual sense, the BCP can be viewed as an umbrella plan that has within it the elements such as Disaster Recovery Plan as one of its subcomponents. The following are the main components of a Business Continuity Plan

1. Business Resumption Plan

2. Incident Management Plan

3. Continuity of Operations Plan

4. Occupant Emergency Plan

5. Disaster Recovery Plan

It is worth noting that the Business Resumption Plan, the Continuity of Operation Plan and the Occupant Emergency Plan do not deal at any instance with the organization's Information Technology (it) infrastructure.

The Data Recovery Process

The JMC manufacturing processes must continue to thrive regardless of the incidents that have affected the company's it infrastructure. It is therefore crucial to gather all the system components and the supporting staff who are to help in the carrying out of the activities related to maintaining a continuous flow of data necessary for the carrying out of JMC's manufacturing operations.

The initial process of ensuring that normal operations continue in at the manufacturing facility is to assemble a team that is mandated with the running of a temporary it infrastructure command post. The command post or control room is to be used to monitor all the vital business operations at JMC.The computers to use must be efficient and the data and software to be used in the system must be obtained from the offsite data backup system. It is important to note that the most fundamental systems to resuscitate are the ones that are mission-critical. This means that the systems that must be brought back online are the ones that are directly concerned with the running of the organization's main facilities. In this case all the it infrastructure components that are directly involved with the manufacturing processes are the ones to be brought back online. Others that are involved with various transactions and monitoring systems are to be worked on at a later time.

In order to ensure that it infrastructure is not interfered with in the future, it is important to ensure that a solid plan is drawn and put in place. The plan must be able to be initiated and implemented within the shortest time possible. The Table 1. below gives a rough guideline on how to chose and implement the disaster recovery plans.

A disaster can be termed as a sudden and an unprecedented catastrophe that has the potential of rendering the various mission-critical components and critical processes of an organization ineffective. The result is a total disruption of the normal business processes and hence the inability of an organization to carry on with its key operation and hence huge financial losses and even possible legal actions against the company.

The it disaster recovery process is made up of a series of definite rules and processes that are put in place in order to ensure that the various critical business operations continue uninterrupted. The following is the guideline for it disaster recovery process.

In order to ensure that the JMC it infrastructure is brought back to normality, it is important to ensure that a sequence of events takes place. This sequence is important in ensuring that the various mission-critical processes are maintained in their normal working conditions. The initial step in the it disaster recovery process is the establishment of a planning group. This planning group is to be mandated with the identification of all the mission-critical component of the JMC manufacturing processes. It is important to include all the mission-critical elements so as to come up with an effective it infrastructure. Due to the limited time frame, it is important to assemble the planning group within the shortest time possible. The planning group then is to embark on the next activity that involves the performance of risk assessment and audits. This is to ensure that all the mission critical elements of the firm are ball captured. The emergency centre is then to be setup with the requirement that are dictated by the result of the risk assessment and audit results. After this has been carried out, the firm is then to carry out an establishment of priorities for the various applications that support the JMC manufacturing activities and the supporting network infrastructure. After this has been carried out, then the data recovery strategies are drawn in order to support the appropriate components of the manufacturing system. It is important then to prepare an efficient inventory and a documentation of the prescribed plan. This is important for future reference and for troubleshooting the system. The drawn plan is then to be verified according to a verification criterion that is also to be developed. The verification criteria involves a series of standard steps that are aimed at coming up with the best system for undertaking the data recovery operation. The final step is to implement the drawn it data recovery plan.

Time scales

It is important to understand that the it data recovery planning group should be made up of individuals who are conversant with all the business processes and the technology behind the various network architecture. This is crucial for the formulation of a viable DRP. It is important that the following table be used in classifying the company's applications.

Classification

Description

1

Mission Critical

Mission Critical to completing the mission of the organization

Can only be performed by computers

There is… [END OF PREVIEW]

Download Full Paper (16 pages; perfectly formatted; Microsoft Word file) Microsoft Word File

Information Technology a Home Network Is a


Security Awareness the Weakest Link in an


Information Technology's Impact on Quality of Life


Information Technology Summary and Critique of "Strike


Information Technology an Effective Project Manager Needs


View 1,000+ other related papers  >>

Cite This Paper:

APA Format

Information Technology (IT) Security Plan For Car Motor Company.  (2010, May 24).  Retrieved September 22, 2017, from https://www.essaytown.com/subjects/paper/information-technology-security/9942066

MLA Format

"Information Technology (IT) Security Plan For Car Motor Company."  24 May 2010.  Web.  22 September 2017. <https://www.essaytown.com/subjects/paper/information-technology-security/9942066>.

Chicago Format

"Information Technology (IT) Security Plan For Car Motor Company."  Essaytown.com.  May 24, 2010.  Accessed September 22, 2017.
https://www.essaytown.com/subjects/paper/information-technology-security/9942066.

Disclaimer