Describe the applications and files that you will backup

Assignment Help Computer Engineering
Reference no: EM132218456

Disaster Recovery Assignment

You are the administrator for your team in a small IT services company named Skillage I.T.

You are tasked with formulating a disaster recovery plan for the organisation. The organisation's 20 staff are reliant on Email and a database online application that contains all customer records and billing information. Each of the users enjoys individual desktop settings and application dashboards regardless of which PC they use. The business uses the internet extensively in its operations.

Skillage I.T. only offers support to its customers Monday to Friday 8am to 6pm. The contingency policy for the company states that you must be able to restore quickly in the event of a failure and use only one tape media to restore all data.

Finance has also flagged an issue that some billing information must be kept for the duration of the financial year.

You decide that you need to plan a backup schedule that needs to describe the frequency and type of backups that will be required and the storage location and quantity of the tapes.

You also decide that you should bullet point some risk mitigation strategies for the systems.

List threats that could impact any of the important data listed above.

Briefly describe the applications and files that you will backup...

Which, if any, data listed as important may be subject to legislative or regulatory constraints?

Explain the key reasons behind your backup strategy and schedule.

List any Risk Mitigation Strategies for user documents, systems redundancy and failover techniques that could be employed.

Reference no: EM132218456

Questions Cloud

Find each alphabetic character and its position : Find each numeric character and its position. Find each alphabetic character and its position.
Design a treatment plan including short- and long-term goals : Design a treatment plan including short- and long-term goals. Explain two evidence-based interventions you would use to address these couple's or family's issue
Discuss the key functions of the given positions : Conduct some research to determine whether or not Facebook has an Ethics Officer or Oversight Committee. If so, discuss the key functions of these positions.
Create a new matrix b of the same format : You need to create a new matrix B of the same format which essentially is the matrix A up-side down!
Describe the applications and files that you will backup : List any Risk Mitigation Strategies for user documents, systems redundancy and failover techniques that could be employed.
What does national health insurance mean : What does "national health insurance" mean? Give at least one example of this. What was the basic goal of the Patient Protection and Affordable Care Act?
What stressors during middle adulthood might contribute : Individuals in middle adulthood experience both gains and losses in physical, cognitive, and psychosocial functioning. Middle adulthood can be a very positive.
What you have learned throughout the course : Utilize what you have learned throughout the course to describe specific services that each workshop will include. Tailor each description to the community.
Explain how each object is created during the game : Identify all of the classes and each of their attributes and methods. Explain how each object is created during the game.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd