Solved

Disaster recovery scenarios

Posted on 2009-04-06
3
595 Views
Last Modified: 2012-05-06
disaster recovery scenarios
0
Comment
Question by:eyedbaby
3 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 24083039
Can you expand on that a little?
0
 

Author Comment

by:eyedbaby
ID: 24083050
sure, I'm doing a project about verizon bussiness about disaster recovery, but I cant come up for differents scenarios, I know about power outages and floods but I just need a little help for more scenarios and solutions
0
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 24084463
The scenarios should be based on the most risky situations inherent to the environment. The proper procedure would be to conduct a business impact assessment (BIA) to identify the financial and operational impact of interruptions to the service, then do a risk analysis to identify the riskiest threats and vulnerabilities in the system. The result is the base for the test cases you should prepare against.

Typically a disaster recovery plan should have preplanned responses to disasters in the following areas:

# IT infrastructure: Network, Internet access, data and application servers.
# Building facilities: Electricity, cooling, heating, water, fire.
# Communications: E-mail, landline telephones, cell phones.
# Personnel: Key personnel required to take action during a crisis.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here are the five steps I suggest to every sysadmin to fix the fall-out from a security breach.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

774 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question