Solved

Disaster recovery scenarios

Posted on 2009-04-06
3
586 Views
Last Modified: 2012-05-06
disaster recovery scenarios
0
Comment
Question by:eyedbaby
3 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 24083039
Can you expand on that a little?
0
 

Author Comment

by:eyedbaby
ID: 24083050
sure, I'm doing a project about verizon bussiness about disaster recovery, but I cant come up for differents scenarios, I know about power outages and floods but I just need a little help for more scenarios and solutions
0
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 24084463
The scenarios should be based on the most risky situations inherent to the environment. The proper procedure would be to conduct a business impact assessment (BIA) to identify the financial and operational impact of interruptions to the service, then do a risk analysis to identify the riskiest threats and vulnerabilities in the system. The result is the base for the test cases you should prepare against.

Typically a disaster recovery plan should have preplanned responses to disasters in the following areas:

# IT infrastructure: Network, Internet access, data and application servers.
# Building facilities: Electricity, cooling, heating, water, fire.
# Communications: E-mail, landline telephones, cell phones.
# Personnel: Key personnel required to take action during a crisis.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Many companies are looking to get out of the datacenter business and to services like Microsoft Azure to provide Infrastructure as a Service (IaaS) solutions for legacy client server workloads, rather than continuing to make capital investments in h…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now