Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Disaster recovery scenarios

Posted on 2009-04-06
3
597 Views
Last Modified: 2012-05-06
disaster recovery scenarios
0
Comment
Question by:eyedbaby
3 Comments
 
LVL 30

Expert Comment

by:Duncan Meyers
ID: 24083039
Can you expand on that a little?
0
 

Author Comment

by:eyedbaby
ID: 24083050
sure, I'm doing a project about verizon bussiness about disaster recovery, but I cant come up for differents scenarios, I know about power outages and floods but I just need a little help for more scenarios and solutions
0
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 24084463
The scenarios should be based on the most risky situations inherent to the environment. The proper procedure would be to conduct a business impact assessment (BIA) to identify the financial and operational impact of interruptions to the service, then do a risk analysis to identify the riskiest threats and vulnerabilities in the system. The result is the base for the test cases you should prepare against.

Typically a disaster recovery plan should have preplanned responses to disasters in the following areas:

# IT infrastructure: Network, Internet access, data and application servers.
# Building facilities: Electricity, cooling, heating, water, fire.
# Communications: E-mail, landline telephones, cell phones.
# Personnel: Key personnel required to take action during a crisis.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
php extract($_REQUEST) 5 88
Cloud Security  - encryption needed? 6 57
google exe file 5 60
exchange, activesync 2 41
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question