As the newest member of the network administration team for Online Goodies, an e- commerce company, we will describe how to implement the business continuity planning process that will include testing, process, and documentation maintenance of backup and recovery procedures for the company. Online Goodies network administration team will also describe the difference between risk analysis, business continuity planning, and a disaster recovery plan. We will also describe our assessment on how our procrastination will impact he need for IT systems, applications ND data.
Business Impact analysis Business Impact analysis (BIB) is a very Important essential component of Online Goodie’s business continuance plan. It Includes components that show vulnerabilities and planning components to develop strategies for milling risk. The result of a BIB report describes the potential risks specific to Online Goodies. One of the basic assumptions behind BIB is that every component of the organization is dependent upon the functioning of every other component, but that some are more crucial than others and require a greater allocation of funds in the wake of a disaster.
For example, Online Goodies may be able to continue more or less normally if the e- commerce system has maintenance issues, but would come to a complete stop if the information system crashes (M. Rouse, 2005) Business Continuity Plan A Business Continuity Plan is “a plan for how to handle outages to IT systems, applications and data access in order to maintain business operation. A Business Impact Analysis Is a prerequisite analysis for a Business continuity plan that priorities Nilsson critical systems, applications and data and the Impact of an outage or downtime. (Kill& Solomon, 2012) Risk Analysis The main purpose in performing a risk analysis for Online Goodies IT systems, is to ensure whether or not not the risks are small or large. This is done to accomplish our tasks by better securing the IT systems that store, process, or transmit Online Goodies information. The primary function of risk analysis is to identify and correct the vulnerabilities and threats of an IT system. It enables management to make well- informed risk management decisions and Justify the spending that is part of an IT budget.
This also assists management in authorizing or accrediting the IT systems based on the performance results of a risk analysis (Causes M. 2013) Disaster Recovery Plan A disaster recovery plan Is a part of our business continuity plan, which Is employed in the unlikely event a disaster destroys part or all of Online Goodie’s resources, In order to ensure the DRP is effective you would need to conduct a series of walk- troughs simulations, and testing to indicate whether or not the plan is employable.
A walk-through must be conducted by each member. But before any steps are taken meeting will be set to explain the steps required to start the DRP. A simulation will be done by each member doing a dry run to ensure that it is correct, when everything is complete the final steps will be in place to ensure every aspect of Online Goodies will be protected.
Making a checklist is a mandatory step before any job is complete, all employees must create and complete a checklist of all tasks that need to be done during and after an event is to take place. Then parallel testing would be in place, because in the event that we change our systems all pertinent information will be protected and backed up by a dedicated server running all the same programs, this will protect all of Online Goodies information.
Here at Online Goodies want to ensure our DRP is effective in any unlikely event a disaster would occur. Recovery strategies should be developed for Information technology (IT) systems, applications and data. This includes networks, servers, desktops, laptops, wireless devices, data and connectivity. Priorities for IT recovery should be consistent with the priorities for recovery of business functions and processes that were plopped during the business impact analysis.
IT resources required to support time-sensitive business functions and processes should also be identified. The recovery time for an IT resource should match the ROT for the business function or process that depends on the IT resource. (Ready Admit 2011) B. Causes 2013 http://www. Darkening. Com/management/how-to-conduct-an-effective-it-security/ 240146681 M. Rouse http://shortchange. Technocrat. Com/definition/business-impact-analysis Ready Administration 2011 http://www. Ready. Gob/business/implementation/let